[go: up one dir, main page]

CN108492104B - A resource transfer monitoring method and device - Google Patents

A resource transfer monitoring method and device Download PDF

Info

Publication number
CN108492104B
CN108492104B CN201810144895.4A CN201810144895A CN108492104B CN 108492104 B CN108492104 B CN 108492104B CN 201810144895 A CN201810144895 A CN 201810144895A CN 108492104 B CN108492104 B CN 108492104B
Authority
CN
China
Prior art keywords
risk identification
resource transfer
risk
target account
transfer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810144895.4A
Other languages
Chinese (zh)
Other versions
CN108492104A (en
Inventor
汲小溪
高利翠
陈露佳
王维强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810144895.4A priority Critical patent/CN108492104B/en
Publication of CN108492104A publication Critical patent/CN108492104A/en
Priority to TW107146357A priority patent/TWI698770B/en
Priority to SG11202006760TA priority patent/SG11202006760TA/en
Priority to PCT/CN2019/073130 priority patent/WO2019154115A1/en
Priority to US16/911,089 priority patent/US11526889B2/en
Application granted granted Critical
Publication of CN108492104B publication Critical patent/CN108492104B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N20/20Ensemble learning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/0499Feedforward networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/09Supervised learning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Mathematical Physics (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本申请实施例提供了一种资源转移监测方法及装置,该方法包括:根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果。本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。

Figure 201810144895

Embodiments of the present application provide a method and device for monitoring resource transfer. The method includes: performing a first risk identification on a target account according to a resource transfer request to obtain a first risk identification result; performing a first risk identification on the target account according to the resource transfer request. The second risk identification is obtained, and the second risk identification result is obtained; according to the first risk identification result and the second risk identification result, the resource transfer risk monitoring result of the target account is determined. In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

Figure 201810144895

Description

一种资源转移监测方法及装置A resource transfer monitoring method and device

技术领域technical field

本申请涉及计算机技术领域,尤其涉及一种资源转移监测方法及装置。The present application relates to the field of computer technology, and in particular, to a resource transfer monitoring method and device.

背景技术Background technique

目前,随着移动支付技术的快速发展,给人们的日常生活带来了极大的便捷性,但是,也给网络犯罪分子创造了实施网络欺诈的可能性,网络欺诈行为随之增加,欺诈犯罪层出不穷,据统计每日上千位欺诈者在进行资源销赃支出,每个欺诈者涉及约几十个受害者。例如,徐玉玉电信诈骗等案件也引发了公众的关注与思考。At present, with the rapid development of mobile payment technology, it has brought great convenience to people's daily life. However, it has also created the possibility for cybercriminals to commit cyber fraud, and cyber fraud activities have increased accordingly. One after another, according to statistics, thousands of fraudsters are spending resources to sell stolen goods every day, and each fraudster involves about dozens of victims. For example, Xu Yuyu's telecom fraud and other cases have also aroused public attention and thinking.

当前,对网络欺诈销赃行为的管控方式主要是:针对受害者举报投诉情况,进行核实并管控,但往往欺诈者通常会迅速资源转移,在短时间内完成销赃,因此,接收到受害者举报投诉,再到定性为欺诈行为的过程中,欺诈者已经转入账户的资源进行销赃处理,管控时效性比较差,无法实现对欺诈者的欺诈销赃行为进行及时防控,进而无法及时阻止欺诈者资源转移。At present, the management and control methods of online fraud and sales of stolen goods are mainly: verify and control the complaints reported by victims, but often fraudsters usually transfer resources quickly and complete the sales of stolen goods in a short period of time. Therefore, receiving complaints from victims , and then to the process of characterization as fraudulent behavior, the fraudster has transferred the resources of the account for the disposal of stolen goods, and the management and control timeliness is relatively poor, and it is impossible to timely prevent and control the fraudulent behavior of the fraudster, and thus cannot prevent the fraudster’s resources in time. transfer.

由此可知,现有技术中只针对被投诉的欺诈行为进行事后管控,并未对资源转移进行实时监控,对欺诈、销赃资源转移进行管控的时效性差。It can be seen from this that in the prior art, only post-event management and control of the complained fraudulent behavior is carried out, and real-time monitoring of resource transfer is not performed, and the timeliness of management and control of fraudulent and stolen resource transfer is poor.

发明内容SUMMARY OF THE INVENTION

本申请实施例的目的是提供一种资源转移监测方法及装置,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。The purpose of the embodiments of the present application is to provide a resource transfer monitoring method and device, which can automatically monitor the real-time resource transfer of a target account, timely detect suspicious accounts with fraudulent sales of stolen goods, and minimize the losses of victims. The result of the transfer-in risk identification and the transfer-out risk identification result determines the final resource transfer risk monitoring result, which improves the accuracy of the determination of fraudulent sales of stolen goods.

为解决上述技术问题,本申请实施例是这样实现的:In order to solve the above-mentioned technical problems, the embodiments of the present application are implemented as follows:

本申请实施例提供了一种资源转移监测方法,包括:The embodiment of the present application provides a resource transfer monitoring method, including:

根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Perform the first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result;

根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。According to the first risk identification result and the second risk identification result, the resource transfer risk monitoring result of the target account is determined.

本申请实施例提供了一种资源转移监测方法,包括:The embodiment of the present application provides a resource transfer monitoring method, including:

利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the first risk identification model to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

利用第二风险识别模型根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Use the second risk identification model to perform second risk identification on the target account according to the resource transfer request, and obtain a second risk identification result;

利用第三风险识别模型根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。The third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

本申请实施例提供了一种资源转移监测装置,包括:The embodiment of the present application provides a resource transfer monitoring device, including:

第一风险识别模块,用于根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;a first risk identification module, configured to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

第二风险识别模块,用于根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;A second risk identification module, configured to perform a second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

监测结果确定模块,用于根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。The monitoring result determination module is configured to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

本申请实施例提供了一种资源转移监测装置,包括:The embodiment of the present application provides a resource transfer monitoring device, including:

第一风险识别模块,用于利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;a first risk identification module, configured to use the first risk identification model to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

第二风险识别模块,用于利用第二风险识别模型根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;a second risk identification module, configured to use the second risk identification model to perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

监测结果确定模块,用于利用第三风险识别模型根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。The monitoring result determination module is configured to use the third risk identification model to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

本申请实施例提供了一种资源转移监测设备,包括:处理器;以及An embodiment of the present application provides a resource transfer monitoring device, including: a processor; and

被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:

根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Perform the first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result;

根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。According to the first risk identification result and the second risk identification result, the resource transfer risk monitoring result of the target account is determined.

本申请实施例提供了一种资源转移监测设备,包括:处理器;以及An embodiment of the present application provides a resource transfer monitoring device, including: a processor; and

被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:

利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the first risk identification model to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

利用第二风险识别模型根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Use the second risk identification model to perform second risk identification on the target account according to the resource transfer request, and obtain a second risk identification result;

利用第三风险识别模型根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。The third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

本申请实施例提供了一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:Embodiments of the present application provide a storage medium for storing computer-executable instructions, where the executable instructions implement the following processes when executed:

根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Perform the first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result;

根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。According to the first risk identification result and the second risk identification result, the resource transfer risk monitoring result of the target account is determined.

本申请实施例提供了一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:Embodiments of the present application provide a storage medium for storing computer-executable instructions, where the executable instructions implement the following processes when executed:

利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the first risk identification model to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

利用第二风险识别模型根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Use the second risk identification model to perform second risk identification on the target account according to the resource transfer request, and obtain a second risk identification result;

利用第三风险识别模型根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。The third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

本申请实施例中的资源转移监测方法及装置,根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果。本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the resource transfer monitoring method and device in the embodiments of the present application, the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained; the second risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained. 2. Risk identification result; according to the first risk identification result and the second risk identification result, determine the resource transfer risk monitoring result of the target account. In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

附图说明Description of drawings

为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following briefly introduces the accompanying drawings required for the description of the embodiments or the prior art. Obviously, the drawings in the following description are only These are some embodiments described in this application. For those of ordinary skill in the art, other drawings can also be obtained based on these drawings without any creative effort.

图1为本申请一实施例提供的资源转移监测方法的第一种流程示意图;FIG. 1 is a first schematic flowchart of a resource transfer monitoring method provided by an embodiment of the present application;

图2为本申请一实施例提供的资源转移监测方法中确定第一风险识别结果的实现原理示意图;2 is a schematic diagram of an implementation principle of determining a first risk identification result in a resource transfer monitoring method provided by an embodiment of the present application;

图3为本申请一实施例提供的资源转移监测方法的第二种流程示意图;FIG. 3 is a second schematic flowchart of a resource transfer monitoring method provided by an embodiment of the present application;

图4为本申请一实施例提供的资源转移监测方法中确定第二风险识别结果的实现原理示意图;4 is a schematic diagram of an implementation principle of determining a second risk identification result in a resource transfer monitoring method provided by an embodiment of the present application;

图5为本申请一实施例提供的资源转移监测方法的第三种流程示意图;FIG. 5 is a third schematic flowchart of a method for monitoring resource transfer provided by an embodiment of the present application;

图6为本申请一实施例提供的资源转移监测方法中确定资源转移风险监测结果的实现原理示意图;6 is a schematic diagram of the realization principle of determining a resource transfer risk monitoring result in a resource transfer monitoring method provided by an embodiment of the present application;

图7为本申请一实施例提供的资源转移监测方法中目标账户的资源转移风险识别的实现原理示意图;7 is a schematic diagram of the realization principle of the resource transfer risk identification of the target account in the resource transfer monitoring method provided by an embodiment of the present application;

图8为本申请一实施例提供的资源转移监测方法的第四种流程示意图;FIG. 8 is a fourth schematic flowchart of a resource transfer monitoring method provided by an embodiment of the present application;

图9为本申请另一实施例提供的资源转移监测方法的第一种流程示意图;FIG. 9 is a first schematic flowchart of a resource transfer monitoring method provided by another embodiment of the present application;

图10为本申请另一实施例提供的资源转移监测方法的第二种流程示意图;10 is a second schematic flowchart of a resource transfer monitoring method provided by another embodiment of the present application;

图11为本申请另一实施例提供的资源转移监测方法的第三种流程示意图;11 is a third schematic flowchart of a resource transfer monitoring method provided by another embodiment of the present application;

图12为本申请实施例提供的资源转移监测装置的第一种模块组成示意图;FIG. 12 is a schematic diagram of a first module composition of a resource transfer monitoring device provided by an embodiment of the present application;

图13为本申请实施例提供的资源转移监测装置的第二种模块组成示意图;13 is a schematic diagram of the composition of a second module of the resource transfer monitoring device provided by the embodiment of the present application;

图14为本申请实施例提供的资源转移监测设备的结构示意图。FIG. 14 is a schematic structural diagram of a resource transfer monitoring device provided by an embodiment of the present application.

具体实施方式Detailed ways

为了使本技术领域的人员更好地理解本申请中的技术方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described The embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of this application.

本申请实施例提供了一种资源转移监测方法及装置,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。The embodiments of the present application provide a resource transfer monitoring method and device, which can automatically monitor the real-time resource transfer of a target account, timely detect suspicious accounts with fraudulent sales of stolen goods, and minimize the losses of victims. The risk identification result and the transfer-out risk identification result determine the final resource transfer risk monitoring result, which improves the accuracy of the determination of fraudulent sales of stolen goods.

图1为本申请一实施例提供的资源转移监测方法的第一种流程示意图,图1中的方法的执行主体可以为服务器,也可以为终端设备,其中,服务器可以是独立的一个服务器,也可以是由多个服务器组成的服务器集群。如图1所示,该方法至少包括以下步骤:FIG. 1 is a first schematic flowchart of a method for monitoring resource transfer provided by an embodiment of the present application. The execution body of the method in FIG. 1 may be a server or a terminal device, wherein the server may be an independent server, or It can be a server cluster consisting of multiple servers. As shown in Figure 1, the method at least includes the following steps:

S101,根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;S101, performing a first risk identification on a target account according to a resource transfer request to obtain a first risk identification result;

其中,该资源转入请求中携带有资源转入发起方标识和资源转入接收方标识(即目标账户标识),具体的,以资源转入发起方向目标账户进行汇款为例,在接收到汇款转入请求时,先对本次汇款交易进行欺诈风险识别,得到欺诈风险识别结果,即判断本次汇款交易是否存在欺诈风险,进而确定本次汇款交易是受害者在被欺骗的情况下向欺诈者提供的目标账户欺诈汇款,还是资源转入发起方在知情的情况下向资源转入接收方提供的合法账户正常汇款。The resource transfer request carries the identifier of the initiator of resource transfer and the identifier of the receiver of resource transfer (that is, the target account identifier). When making a transfer request, first identify the fraud risk of this remittance transaction, and obtain the fraud risk identification result, that is, to determine whether there is a fraud risk in this remittance transaction, and then determine that this remittance transaction is the victim who is deceived to fraudulently. Whether the fraudulent remittance to the target account provided by the sender, or the normal remittance to the legitimate account provided by the resource transfer recipient under the knowledge of the resource transfer initiator.

S102,根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;S102, performing second risk identification on the target account according to the resource transfer request, to obtain a second risk identification result;

其中,针对体现交易而言,该资源转出请求中携带有资源转出发起方标识(即目标账户标识);针对转账交易而言,该资源转出请求中携带有资源转出发起方标识(即目标账户标识)和资源转出接收方标识,具体的,以目标账户向资源转出接收方进行转账为例,在接收到转账请求时,先对本次转账交易进行销赃风险识别,得到销赃风险识别结果,即确定本次转账交易存在销赃风险程度。Among them, for the embodied transaction, the resource transfer out request carries the resource transfer out initiator identifier (namely the target account identifier); for the transfer transaction, the resource transfer out request carries the resource transfer out initiator identifier ( Namely, the target account ID) and the resource transfer recipient ID. Specifically, taking the transfer from the target account to the resource transfer recipient as an example, when a transfer request is received, first identify the risk of selling stolen goods for this transfer transaction, and obtain the information about selling stolen goods. The result of risk identification, that is, to determine the degree of risk of selling stolen goods in this transfer transaction.

S103,根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果。S103, according to the above-mentioned first risk identification result and the above-mentioned second risk identification result, determine the resource transfer risk monitoring result of the target account.

具体的,针对某一目标账户而言,在多个资源转入发起方向该目标账户进行资源转入时,每次资源转入请求均对应于一个第一风险识别结果;在多个资源转入发起方向该目标账户进行资源转入后,该目标账户发起资源转出请求时,先基于本次资源转出请求得到第二风险识别结果,再结合在先得到的多个第一风险识别结果和第二风险识别结果,进行欺诈销赃综合判别,最终确定资源转出请求是否存在资源转移风险,进而确定本次资源转出是欺诈者从目标账户将不法收益非法转出,还是用户从目标账户将合法收益正常转出。Specifically, for a certain target account, when multiple resource transfer initiators transfer resources to the target account, each resource transfer request corresponds to a first risk identification result; After the initiator transfers resources to the target account, when the target account initiates a resource transfer request, first obtain the second risk identification result based on the resource transfer request, and then combine the multiple first risk identification results obtained earlier and The second risk identification result is to conduct a comprehensive judgment of fraudulent sale of stolen goods, and finally determine whether there is a risk of resource transfer in the resource transfer request, and then determine whether the resource transfer is the fraudster illegally transferring the illegal income from the target account, or whether the user transfers the resources from the target account. Legitimate gains are normally transferred out.

本申请实施例中,根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果,这样能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the embodiment of the present application, the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained; the second risk identification is performed on the target account according to the resource transfer request, and the second risk identification result is obtained; The first risk identification result and the second risk identification result are used to determine the resource transfer risk monitoring results of the target account, so that the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent sales of stolen goods can be detected in a timely manner, thereby minimizing the number of victims. At the same time, the final resource transfer risk monitoring result is determined by combining the transfer-in risk identification results and the transfer-out risk identification results, which improves the accuracy of the determination of fraudulent sales of stolen goods.

其中,上述S101根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果,具体包括:The above S101 performs first risk identification on the target account according to the resource transfer request, and obtains a first risk identification result, which specifically includes:

获取与资源转入请求相关的第一关联信息,其中,该第一关联信息包括:发起账户信息、目标账户信息和第一资源转移信息中至少一种。Obtain first association information related to the resource transfer request, where the first association information includes at least one of originating account information, target account information and first resource transfer information.

具体的,第一关联信息包括与资源转入请求相关的多维度特征,该发起账户信息可以包括发起账户的开户名、开户行、开户日期、历史交易记录等账户基本属性;该目标账户信息可以包括账户基本属性、终端行为、终端环境、账户评价等账户信息,该账户基本属性包括目标账户的开户名、开户行、开户日期、历史交易记录、成熟度、当前资产、认证信息、签约信息、通讯录、好友情况等,该终端行为包括移动终端操作记录、浏览记录、社交记录,该终端环境包括账户登录设备、账户登录城市,该账户评价包括账户信誉度、账户处罚情况、账户被举报情况;该第一资源转移信息可以包括发起账户的支付情况、目标账户的收款情况、发起方与接收方之间的人际关系,该支付情况包括:交易金额、人均笔数、金额方差、交易成功率,该收款情况包括:账户聚散性、账户城市数、账户累计收款数额,该发起方与接收方之间的人际关系包括:发起方与收款方为好友关系、亲属关系、同学关系、上下级关系或陌生人关系等等。Specifically, the first associated information includes multi-dimensional features related to the resource transfer request, and the originating account information may include basic account attributes such as the account opening name, account opening bank, account opening date, and historical transaction records of the originating account; the target account information may include: Including basic account attributes, terminal behavior, terminal environment, account evaluation and other account information, the basic attributes of the account include the target account's account name, account opening bank, account opening date, historical transaction records, maturity, current assets, authentication information, contract information, Contacts, friends, etc. The terminal behavior includes mobile terminal operation records, browsing records, and social records. The terminal environment includes account login devices and account login cities. The account evaluation includes account reputation, account penalties, and account reports. ; The first resource transfer information may include the payment status of the initiating account, the collection status of the target account, and the interpersonal relationship between the initiator and the receiver, and the payment status includes: transaction amount, number of transactions per capita, amount variance, transaction success The collection status includes: account aggregation, account city number, and account cumulative collection amount. The interpersonal relationship between the initiator and the receiver includes: the initiator and the payee are friends, relatives, classmates Relationships, subordinate relationships, or stranger relationships, etc.

利用第一风险识别模型根据获取到的第一关联信息,对目标账户进行第一风险识别,得到第一风险识别结果,其中,该第一风险识别模型可以是神经网络模型。The first risk identification model is used to perform first risk identification on the target account according to the obtained first association information, and a first risk identification result is obtained, wherein the first risk identification model may be a neural network model.

具体的,上述神经网络模型是通过如下方式训练得到的:Specifically, the above neural network model is obtained by training in the following ways:

获取多个转入风险训练样本,其中,该转入风险训练样本包括:表征正常转入交易的正样本和表征欺诈行为的负样本;Obtaining a plurality of transfer-in risk training samples, wherein the transfer-in risk training samples include: positive samples representing normal transfer-in transactions and negative samples representing fraudulent behaviors;

基于上述转入风险训练样本训练更新神经网络模型中相关模型参数,其中,该神经网络模型刻画了收款方收款的收益风险特征。Based on the above-mentioned transfer-in risk training samples, the relevant model parameters in the neural network model are trained and updated, wherein the neural network model depicts the income and risk characteristics of the payee's collection.

接下来,如图2所示,将获取到的第一关联信息输入至预先训练好的神经网络模型,获取该神经网络模型基于第一关联信息对资源转入请求进行转入风险打分,得到第一风险识别结果,该第一风险识别结果可以是具体的风险值,也可以是风险等级。在具体实施时,利用预先训练好的神经网络模型对第一关联信息中的多维度特征分别进行打分,根据各维度特征的综合得分确定第一风险识别结果。Next, as shown in Figure 2, the acquired first associated information is input into the pre-trained neural network model, and the neural network model is obtained to score the resource transfer request based on the first associated information, and obtain the first A risk identification result, the first risk identification result may be a specific risk value or a risk level. During specific implementation, the pre-trained neural network model is used to respectively score the multi-dimensional features in the first associated information, and the first risk identification result is determined according to the comprehensive score of each dimensional feature.

进一步的,考虑到针对资源转入风险极高的情况下,需要及时对资源转入交易进行管控,采用哪种转入管控方式可以根据识别出的转入风险程度来确定,实现在受害者向目标账户转入资源的过程中有针对性的对交易行为进行合理管控,基于此,如图3所示,上述S101根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:Further, considering that in the case of extremely high risk of resource transfer, the resource transfer transaction needs to be managed and controlled in a timely manner, which transfer control method to use can be determined according to the identified transfer risk degree, so as to realize the realization of In the process of transferring resources to the target account, the transaction behavior is appropriately managed and controlled. Based on this, as shown in FIG. 3, the above S101 performs the first risk identification on the target account according to the resource transfer request, and obtains the first risk identification result. After that, also include:

S104,根据得到的第一风险识别结果,确定是否响应接收到的资源转入请求。S104, according to the obtained first risk identification result, determine whether to respond to the received resource transfer request.

具体的,以第一风险识别结果为转入风险等级为例,如果转入风险等级大于预设等级阈值,则说明本次资源转入为欺诈转入的可能性比较大,需要暂时停止响应资源转入业务,确定相应的转入管控方式及时进行管控。Specifically, taking the transfer-in risk level as the first risk identification result as an example, if the transfer-in risk level is greater than the preset level threshold, it means that the current resource transfer is likely to be a fraudulent transfer, and it is necessary to temporarily stop responding to resources For the transfer-in business, determine the corresponding transfer-in management and control methods to conduct timely management and control.

若确定不响应,则执行S105,触发执行与第一风险识别结果对应的转入管控方式。If it is determined that there is no response, S105 is executed to trigger execution of the transfer-in management and control mode corresponding to the first risk identification result.

例如,如果转入风险等级大于第一预设等级阈值且小于第二预设等级阈值,则向资源转入发起方发送转账风险提示信息,以便提高用户的警惕性;如果转入风险等级大于第二预设等级阈值,则提示本次转入交易失败,在具体实施时,可以设置更多的预设等级阈值,确定转入风险等级落入哪个预设等级阈值区间,选用与该预设等级阈值区间对应的转入管控方式。For example, if the transfer-in risk level is greater than the first preset level threshold and smaller than the second preset level threshold, send the transfer risk prompt information to the resource transfer initiator, so as to improve the user's vigilance; if the transfer-in risk level is greater than the first preset level threshold The second preset level threshold indicates that the current transfer-in transaction failed. In the specific implementation, more preset level thresholds can be set to determine which preset level threshold range the transfer-in risk level falls into, and select the same preset level. The transfer-in control method corresponding to the threshold interval.

若确定响应,则执行S106,触发执行与资源转入请求对应的资源转入业务。If the response is determined, S106 is executed to trigger execution of the resource transfer service corresponding to the resource transfer request.

其中,上述S102根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果,具体包括:Wherein, the above S102 performs second risk identification on the target account according to the resource transfer request, and obtains a second risk identification result, which specifically includes:

获取与资源转出请求相关的第二关联信息,其中,该第二关联信息包括:目标账户信息、第二资源转移信息和接收账户信息中至少一种。Acquire second association information related to the resource transfer-out request, where the second association information includes at least one of target account information, second resource transfer information, and receiving account information.

具体的,第二关联信息包括与资源转出请求相关的多维度特征,该目标账户信息可以包括账户基本属性、终端行为、终端环境、账户评价,该账户基本属性包括目标账户的开户名、开户行、开户日期、历史交易记录、成熟度、当前资产、认证信息、签约信息、通讯录、好友情况等,该终端行为包括移动终端操作记录、浏览记录、社交记录,该终端环境包括账户登录设备、账户登录城市、账户登录城市整体欺诈度,该账户评价包括账户信誉度、账户处罚情况、账户被举报情况;该第二资源转移信息可以包括资源转出情况、资源支出行为;该接收账户信息包括账户信誉度、账户处罚情况、账户被举报情况、账户收款情况等等。Specifically, the second association information includes multi-dimensional features related to the resource transfer request, the target account information may include basic account attributes, terminal behavior, terminal environment, and account evaluation, and the basic account attributes include the account opening name of the target account, account opening Bank, account opening date, historical transaction records, maturity, current assets, authentication information, contract information, address book, friend information, etc. The terminal behavior includes mobile terminal operation records, browsing records, social records, and the terminal environment includes account login equipment , the account login city, the overall fraud degree of the account login city, the account evaluation includes account credit, account punishment, and account reporting; the second resource transfer information may include resource transfer, resource expenditure behavior; the receiving account information Including account creditworthiness, account penalties, account reports, account collections, etc.

利用第二风险识别模型根据获取到的第二关联信息,对目标账户进行第二风险识别,得到第二风险识别结果,其中,该第二风险识别模型可以是梯度提升树模型(GBRT,Gradient Boosting Regression Tree)。The second risk identification model is used to perform second risk identification on the target account according to the obtained second association information, and a second risk identification result is obtained, wherein the second risk identification model may be a gradient boosting tree model (GBRT, Gradient Boosting tree model). Regression Tree).

具体的,上述梯度提升树模型是通过如下方式训练得到的:Specifically, the above gradient boosting tree model is obtained by training as follows:

获取多个转出风险训练样本,其中,该转出风险训练样本包括:表征正常转出交易的正样本和表征销赃行为的负样本;Obtaining a plurality of transfer-out risk training samples, wherein the transfer-out risk training samples include: positive samples representing normal transfer-out transactions and negative samples representing behavior of selling stolen goods;

基于上述转出风险训练样本训练更新梯度提升树模型中相关模型参数,该梯度提升树模型刻画了收款方支出的销赃风险特征。Based on the above-mentioned transfer-out risk training samples, the relevant model parameters in the gradient boosting tree model are trained and updated.

接下来,如图4所示,将获取到的第二关联信息输入至预先训练好的梯度提升树模型,获取该梯度提升树模型基于第二关联信息对资源转出请求进行转出风险打分,得到第二风险识别结果,该第二风险识别结果可以是具体的风险值,也可以是风险等级。在具体实施时,利用预先训练好的梯度提升树模型对第二关联信息中的多维度特征分别进行打分,根据各维度特征的综合得分确定第二风险识别结果。Next, as shown in FIG. 4 , the obtained second association information is input into the pre-trained gradient boosting tree model, and the gradient boosting tree model is obtained to perform a transfer-out risk score for the resource transfer-out request based on the second association information, A second risk identification result is obtained, and the second risk identification result may be a specific risk value or a risk level. In a specific implementation, the pre-trained gradient boosting tree model is used to score the multi-dimensional features in the second associated information respectively, and the second risk identification result is determined according to the comprehensive score of each dimensional feature.

其中,上述S103根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果,如图5所示,具体包括:Wherein, the above-mentioned S103 determines the resource transfer risk monitoring result of the target account according to the above-mentioned first risk identification result and the above-mentioned second risk identification result, as shown in FIG. 5 , and specifically includes:

S1031,根据在先得到的目标账户的多个第一风险识别结果,确定转入风险识别结果。S1031: Determine the transfer-in risk identification results according to the multiple first risk identification results of the target account obtained previously.

具体的,针对某一目标账户而言,在多个资源转入发起方向该目标账户进行资源转入时,每次资源转入请求均对应于一个第一风险识别结果,基于多个第一风险识别结果,确定转入风险识别结果,该转入风险识别结果可以是多个第一风险识别结果中的一个识别结果,例如,表征风险程度最高的第一风险识别结果、或者最新得到的第一风险识别结果,该转入风险识别结果也可以是多个第一风险识别结果的综合结果,例如,多个风险识别结果的加权平均风险、或者多个风险识别结果的累计风险。Specifically, for a certain target account, when multiple resource transfer initiators transfer resources to the target account, each resource transfer request corresponds to a first risk identification result, based on multiple first risks Identification result, determine the transfer-in risk identification result, the transfer-in risk identification result may be one identification result among multiple first risk identification results, for example, the first risk identification result representing the highest risk degree, or the newly obtained first risk identification result. The risk identification result, the transferred-in risk identification result may also be a comprehensive result of multiple first risk identification results, for example, the weighted average risk of multiple risk identification results, or the cumulative risk of multiple risk identification results.

S1032,利用第三风险识别模型根据转入风险识别结果和第二风险识别结果,确定至少一个资源转移风险识别策略,其中,该第三风险识别模型可以是分类回归树模型。S1032, using a third risk identification model to determine at least one resource transfer risk identification strategy according to the transfer-in risk identification result and the second risk identification result, where the third risk identification model may be a classification regression tree model.

具体的,确定出的每个转入风险识别结果与第二风险识别结果的组合均构成一个资源转移风险识别策略,例如,资源转移风险识别策略包括:表征风险程度最高的第一风险识别结果和第二风险识别结果的组合、最新得到的第一风险识别结果和第二风险识别结果的组合、多个第一风险识别结果的加权平均风险和第二风险识别结果的组合、多个第一风险识别结果的累计风险和第二风险识别结果的组合等等,确定出的转入风险识别结果的类型越多,确定出的资源转移风险识别策略越多。Specifically, each determined combination of the transfer-in risk identification result and the second risk identification result constitutes a resource transfer risk identification strategy. For example, the resource transfer risk identification strategy includes: the first risk identification result representing the highest risk degree and The combination of the second risk identification result, the combination of the newly obtained first risk identification result and the second risk identification result, the weighted average risk of multiple first risk identification results and the combination of the second risk identification result, the multiple first risk identification results The cumulative risk of the identification result and the combination of the second risk identification result, etc., the more types of identified transfer-in risk identification results, the more resource transfer risk identification strategies identified.

S1033,如果确定出的资源转移风险识别策略中至少一个满足预设条件,则确定目标账户为风险账户。S1033, if at least one of the determined resource transfer risk identification strategies satisfies a preset condition, determine the target account as a risk account.

具体的,每个资源转移风险识别策略均对应各自的约束条件,该约束条件包括:第一约束条件和第二约束条件,其中,不同资源转移风险识别策略对应的第一约束条件互不相同,针对某一资源转移风险识别策略而言,需要判断转入风险识别结果是否满足与该资源转移风险识别策略对应的第一约束条件,以及判断第二风险识别结果是否满足与该资源转移风险识别策略对应的第二约束条件。例如,针对表征风险程度最高的第一风险识别结果和第二风险识别结果的组合而言,判断表征风险程度最高的第一风险识别结果是否满足第一约束条件,以及判断第二风险识别结果是否满足第二约束条件,若均满足,则确定该资源转移风险识别策略满足预设条件。Specifically, each resource transfer risk identification strategy corresponds to its own constraint, and the constraint includes: a first constraint and a second constraint, wherein the first constraints corresponding to different resource transfer risk identification strategies are different from each other, For a certain resource transfer risk identification strategy, it is necessary to judge whether the transfer-in risk identification result satisfies the first constraint corresponding to the resource transfer risk identification strategy, and judge whether the second risk identification result satisfies the resource transfer risk identification strategy. the corresponding second constraint. For example, for the combination of the first risk identification result representing the highest risk degree and the second risk identification result, determine whether the first risk identification result representing the highest risk degree satisfies the first constraint condition, and determine whether the second risk identification result The second constraint condition is satisfied, and if both are satisfied, it is determined that the resource transfer risk identification strategy satisfies the preset condition.

具体的,上述分类回归树模型是通过如下方式训练得到的:Specifically, the above classification and regression tree model is obtained by training as follows:

获取多个资源转移风险训练样本,其中,该资源转移风险训练样本包括:针对欺诈行为的历史第一风险识别结果,针对销赃行为的历史第二风险识别结果;Obtaining a plurality of resource transfer risk training samples, wherein the resource transfer risk training samples include: a historical first risk identification result for fraudulent behaviors, and a historical second risk identification result for stolen stolen behavior;

基于上述资源转移风险训练样本训练得到各资源转移风险识别策略对应的约束条件,其中,该约束条件包括:第一约束条件和第二约束条件,第一约束条件与转入风险识别结果相对应,第二约束条件与第二风险识别结果相对应;Based on the above resource transfer risk training samples, the constraints corresponding to each resource transfer risk identification strategy are obtained, wherein the constraints include: a first constraint and a second constraint, the first constraint corresponds to the transfer-in risk identification result, The second constraint condition corresponds to the second risk identification result;

根据得到的各资源转移风险识别策略对应的约束条件更新分类回归树模型中相关模型参数,其中,该分类回归树模型将神经网络模型得到的转入风险识别结果和梯度提升树模型得到的转出风险识别结果关联起来,避免单次识别遗漏的情况。The relevant model parameters in the classification and regression tree model are updated according to the obtained constraints corresponding to each resource transfer risk identification strategy. The classification and regression tree model combines the transfer-in risk identification result obtained by the neural network model and the transfer-out obtained by the gradient boosting tree model. The risk identification results are correlated to avoid the situation of single identification omission.

接下来,如图6所示,将在先得到的目标账户的多个第一风险识别结果和第二风险识别结果输入至预先训练好的分类回归树模型,获取该分类回归树模型输出的多个资源转移风险识别策略,分别判断各资源转移风险识别策略是否满足其对应的预设条件,得到资源转移风险监测结果。Next, as shown in FIG. 6 , input multiple first risk identification results and second risk identification results of the target account obtained earlier into the pre-trained classification and regression tree model, and obtain the output of the classification and regression tree model. Each resource transfer risk identification strategy is determined, whether each resource transfer risk identification strategy satisfies its corresponding preset conditions, and the resource transfer risk monitoring result is obtained.

本申请提供的实施例,在根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果的过程中,采用分类回归树模型(CRT,ClassificationRegression Tree),由于分类回归树模型选用指标简单,基于多个简单的识别策略对待识别对象进行分类,结合利用神经网络模型得到的第一风险识别结果和利用梯度提升树模型得到的第二风险识别结果进行资源转移风险综合判定,提高了资源转移风险监测结果的准确度。In the embodiment provided by this application, in the process of determining the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result, a classification regression tree model (CRT, ClassificationRegression Tree) is used. The model selection index is simple, based on a number of simple identification strategies to classify the objects to be identified, combined with the first risk identification result obtained by using the neural network model and the second risk identification result obtained by using the gradient boosting tree model to comprehensively determine the risk of resource transfer. Improve the accuracy of resource transfer risk monitoring results.

如图7所示,给出了目标账户的资源转移风险识别的实现原理示意图,在图7中,存在多个待监测的目标用户,☆表示具有欺诈销赃行为的风险账户,O表示进行合法交易的正常账户,由经过神经网络模型进行单独风险识别得到的识别结果可知,存在一定的误判率,由经过梯度提升树模型进行单独风险识别得到的识别结果可知,也存在一定的误判率,结合经过神经网络模型进行单独风险识别得到的识别结果和经过梯度提升树模型进行单独风险识别得到的识别结果,再经过分类回归树模块进行资源转移风险综合识别得到的识别结果可知,提高了目标账户的资源转移风险识别的准确度。As shown in Figure 7, a schematic diagram of the realization principle of the resource transfer risk identification of the target account is given. In Figure 7, there are multiple target users to be monitored, ☆ represents a risk account with fraudulent sales of stolen goods, and O represents a legal transaction. There is a certain misjudgment rate from the identification results obtained by the neural network model for individual risk identification. From the identification results obtained through the gradient boosting tree model for individual risk identification, there is also a certain misjudgment rate. Combining the identification results obtained through the neural network model for individual risk identification and the identification results obtained through the gradient boosting tree model for individual risk identification, and then through the classification and regression tree module for comprehensive identification of resource transfer risks, it can be seen that the target account is improved. accuracy of resource transfer risk identification.

进一步的,考虑到针对资源转移风险极高的情况下,需要及时对目标账户进行管控,采用哪种管控方式可以根据确定出的资源转移风险程度来确定,实现在欺诈者进行资源销赃的过程中有针对性的对目标账户进行合理管控,基于此,如图8所示,在确定目标账户为风险账户之后,还包括:Further, considering that the target account needs to be managed and controlled in a timely manner when the risk of resource transfer is extremely high, the control method to be adopted can be determined according to the determined risk degree of resource transfer, so as to realize the fraudsters in the process of selling off resources. Targeted and reasonable management and control of the target account, based on this, as shown in Figure 8, after determining the target account as a risk account, it also includes:

S107,根据满足预设条件的资源转移风险识别策略,确定目标账户的转出管控方式。S107, according to the resource transfer risk identification strategy that satisfies the preset condition, determine the transfer control method of the target account.

具体的,以基于满足预设条件的资源转移风险识别策略的数量确定转出管控方式为例,如果满足预设条件的资源转移风险识别策略的数量大于预设数量阈值,则说明本次资源转出为欺诈销赃的可能性比较大,需要暂时停止响应资源转出业务,确定相应的转出管控方式及时进行管控。Specifically, taking the determination of the transfer-out management and control method based on the number of resource transfer risk identification strategies that meet the preset conditions as an example, if the number of resource transfer risk identification strategies that meet the preset conditions is greater than the preset number threshold, it means that the current resource transfer The possibility of fraudulent sales of stolen goods is relatively high. It is necessary to temporarily stop responding to the resource transfer business, and determine the corresponding transfer control method for timely management and control.

S108,触发执行确定出的转出管控方式对目标账户进行管控。S108 , triggering the execution of the determined transfer-out control method to control the target account.

例如,如果满足预设条件的资源转移风险识别策略的数量大于第一预设数量阈值且小于第二预设数量阈值,则向目标账户发送身份验证请求,以进一步对资源转出发起方进行身份核验,若验证通过,再响应资源转出业务;如果满足预设条件的资源转移风险识别策略的数量大于第二预设数量阈值,则提示本次转出交易失败,在具体实施时,可以设置更多的预设数量阈值,确定预设条件的资源转移风险识别策略的数量落入哪个预设数量阈值区间,选用与该预设数量阈值区间对应的转出管控方式,另外,也可以采用其他方式确定转出管控方式,例如,根据满足预设条件的资源转移风险识别策略的类型确定转出管控方式等等。For example, if the number of resource transfer risk identification strategies that meet the preset conditions is greater than the first preset number threshold and less than the second preset number threshold, an authentication request is sent to the target account to further identify the initiator of the resource transfer. Verification, if the verification is passed, then respond to the resource transfer out business; if the number of resource transfer risk identification strategies that meet the preset conditions is greater than the second preset number threshold, it will prompt the transfer out transaction to fail. In the specific implementation, you can set For more preset quantity thresholds, determine which preset quantity threshold range the quantity of the resource transfer risk identification strategy of the preset conditions falls into, and select the transfer-out control method corresponding to the preset quantity threshold range. In addition, other The transfer-out management and control method is determined by the method, for example, the transfer-out management and control method is determined according to the type of the resource transfer risk identification strategy that satisfies the preset conditions, and so on.

本申请实施例中的资源转移监测方法,根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果。本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the resource transfer monitoring method in the embodiment of the present application, the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained; the second risk identification is performed on the target account according to the resource transfer request, and the second risk is obtained. Identification result; according to the first risk identification result and the second risk identification result, determine the resource transfer risk monitoring result of the target account. In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

对应上述图1至图8描述的资源转移监测方法,基于相同的技术构思,本申请另一实施例还提供了一种资源转移监测方法,图9为本申请实施例提供的资源转移监测方法的第一种流程示意图,图9中的方法的执行主体可以为服务器,也可以为终端设备,其中,服务器可以是独立的一个服务器,也可以是由多个服务器组成的服务器集群。如图9所示,该方法至少包括以下步骤:Corresponding to the resource transfer monitoring method described above in FIGS. 1 to 8 , based on the same technical concept, another embodiment of the present application also provides a resource transfer monitoring method, and FIG. 9 is a schematic diagram of the resource transfer monitoring method provided by the embodiment of the present application. In the first schematic flowchart, the execution body of the method in FIG. 9 may be a server or a terminal device, wherein the server may be an independent server or a server cluster composed of multiple servers. As shown in Figure 9, the method at least includes the following steps:

S901,利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;其中,该资源转入请求中携带有资源转入发起方标识和资源转入接收方标识(即目标账户标识),具体的,以资源转入发起方向目标账户进行汇款为例,在接收到汇款转入请求时,先利用第一风险识别模型对本次汇款交易进行欺诈风险识别,得到欺诈风险识别结果,即判断本次汇款交易是否存在欺诈风险,进而确定本次汇款交易是受害者在被欺骗的情况下向欺诈者提供的目标账户欺诈汇款,还是资源转入发起方在知情的情况下向资源转入接收方提供的合法账户正常汇款。S901, using a first risk identification model to perform first risk identification on the target account according to the resource transfer request, to obtain a first risk identification result; wherein the resource transfer request carries the resource transfer initiator identifier and the resource transfer receiver Party ID (namely the target account ID), specifically, taking the resource transfer initiator remittance to the target account as an example, when receiving the transfer transfer request, first use the first risk identification model to identify the fraud risk of this remittance transaction , to obtain the fraud risk identification result, that is, to determine whether there is a fraud risk in this remittance transaction, and then determine whether this remittance transaction is a fraudulent remittance to the target account provided by the victim to the fraudster under the condition of being deceived, or whether the resource is transferred to the initiator in the Under the circumstance of knowing, transfer the resources to the legal account provided by the recipient and make normal remittances.

具体的,步骤S901的具体实施方式参见步骤S101,这里不再赘述。Specifically, for the specific implementation manner of step S901, refer to step S101, which will not be repeated here.

S902,利用第二风险识别模型根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;其中,针对体现交易而言,该资源转出请求中携带有资源转出发起方标识(即目标账户标识);针对转账交易而言,该资源转出请求中携带有资源转出发起方标识(即目标账户标识)和资源转出接收方标识,具体的,以目标账户向资源转出接收方进行转账为例,在接收到转账请求时,先利用第二风险识别模型对本次转账交易进行销赃风险识别,得到销赃风险识别结果,即确定本次转账交易存在销赃风险程度。S902, using the second risk identification model to perform second risk identification on the target account according to the resource transfer request, to obtain a second risk identification result; wherein, for the embodied transaction, the resource transfer request carries the resource transfer initiator ID (that is, the target account ID); for the transfer transaction, the resource transfer out request carries the resource transfer out initiator ID (that is, the target account ID) and the resource transfer recipient ID. Taking the transfer out of the receiver as an example, when a transfer request is received, the second risk identification model is used to first identify the risk of stolen stolen goods in this transfer transaction, and the identification result of the stolen stolen goods risk is obtained, that is, the degree of the risk of stolen stolen goods in this transfer transaction is determined.

具体的,步骤S902的具体实施方式参见步骤S102,这里不再赘述。Specifically, for the specific implementation manner of step S902, refer to step S102, which will not be repeated here.

S903,利用第三风险识别模型根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果。其中,针对某一目标账户而言,在多个资源转入发起方向该目标账户进行资源转入时,每次资源转入请求均对应于一个利用第一风险识别模型得到的第一风险识别结果;在多个资源转入发起方向该目标账户进行资源转入后,该目标账户发起资源转出请求时,先利用第二风险识别模型基于本次资源转出请求得到第二风险识别结果,再利用第三风险识别模型结合在先得到的多个第一风险识别结果和第二风险识别结果,进行欺诈销赃综合判别,最终确定资源转出请求是否存在资源转移风险,进而确定本次资源转出是欺诈者从目标账户将不法收益非法转出,还是用户从目标账户将合法收益正常转出。S903, using the third risk identification model to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result. For a certain target account, when multiple resource transfer initiators perform resource transfer to the target account, each resource transfer request corresponds to a first risk identification result obtained by using the first risk identification model ; After multiple resource transfer initiators perform resource transfer to the target account, when the target account initiates a resource transfer request, first use the second risk identification model to obtain the second risk identification result based on this resource transfer request, and then use the second risk identification model to obtain the second risk identification result. The third risk identification model is used to combine the multiple first risk identification results and the second risk identification results obtained earlier to conduct a comprehensive judgment on fraudulent disposal of stolen goods, and finally determine whether there is a resource transfer risk in the resource transfer request, and then determine the resource transfer out. Whether the fraudster illegally transfers the illegal income from the target account, or the user transfers the legitimate income from the target account normally.

具体的,步骤S903的具体实施方式参见步骤S103,这里不再赘述。Specifically, for the specific implementation manner of step S903, refer to step S103, which will not be repeated here.

本申请实施例中,利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;利用第二风险识别模型根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;利用第三风险识别模型根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果,这样能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the embodiment of the present application, the first risk identification model is used to perform the first risk identification on the target account according to the resource transfer request, and the first risk identification result is obtained; the second risk identification model is used to perform the second risk identification on the target account according to the resource transfer request. Risk identification to obtain a second risk identification result; use the third risk identification model to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result, so that the real-time resources of the target account can be automatically monitored. Transfer monitoring, timely detect suspicious accounts with fraudulent sales of stolen goods, and minimize the losses of victims. At the same time, combined with the results of the transfer-in risk identification and the transfer-out risk identification results, the final resource transfer risk monitoring results are determined, which improves the fraudulent sales of stolen goods. The accuracy of behavioral determinations.

其中,上述第一风险识别模型、上述第二风险识别模型和上述第二风险识别模型中至少一个满足下述条件:Wherein, at least one of the above-mentioned first risk identification model, the above-mentioned second risk identification model and the above-mentioned second risk identification model satisfies the following conditions:

上述第一风险识别模型为神经网络模型、上述第二风险识别模型为梯度提升树模型、或者上述第二风险识别模型为分类回归树模型。The first risk identification model is a neural network model, the second risk identification model is a gradient boosting tree model, or the second risk identification model is a classification regression tree model.

优选的,在根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果的过程中,采用分类回归树模型(CRT,Classification RegressionTree),由于分类回归树模型选用指标简单,基于多个简单的识别策略对待识别对象进行分类,结合利用神经网络模型得到的第一风险识别结果和利用梯度提升树模型得到的第二风险识别结果进行资源转移风险综合判定,提高了资源转移风险监测结果的准确度。Preferably, in the process of determining the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result, a classification regression tree model (CRT, Classification Regression Tree) is used, because the classification and regression tree model selection index is simple , based on a number of simple identification strategies to classify the objects to be identified, combined with the first risk identification result obtained by using the neural network model and the second risk identification result obtained by using the gradient boosting tree model to comprehensively determine the risk of resource transfer, which improves the resource transfer risk. Accuracy of risk monitoring results.

进一步的,考虑到针对资源转入风险极高的情况下,需要及时对资源转入交易进行管控,采用哪种转入管控方式可以根据识别出的转入风险程度来确定,实现在受害者向目标账户转入资源的过程中有针对性的对交易行为进行合理管控,基于此,如图10所示,在S901利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:Further, considering that in the case of extremely high risk of resource transfer, the resource transfer transaction needs to be managed and controlled in a timely manner, which transfer control method to use can be determined according to the identified transfer risk degree, so as to realize the realization of In the process of transferring resources to the target account, the transaction behavior is appropriately managed and controlled. Based on this, as shown in FIG. 10, in S901, the first risk identification model is used to identify the first risk of the target account according to the resource transfer request. After obtaining the first risk identification result, it also includes:

S904,根据得到的第一风险识别结果,确定是否响应接收到的资源转入请求;其中,步骤S904的具体实施方式参见步骤S104,这里不再赘述。S904, according to the obtained first risk identification result, determine whether to respond to the received resource transfer request; wherein, the specific implementation of step S904 refers to step S104, which is not repeated here.

若确定不响应,则执行S905,触发执行与第一风险识别结果对应的转入管控方式;其中,步骤S905的具体实施方式参见步骤S105,这里不再赘述。If it is determined that there is no response, S905 is executed to trigger execution of the transfer-in management and control mode corresponding to the first risk identification result; wherein, the specific implementation of step S905 refers to step S105, which is not repeated here.

若确定响应,则执行S906,触发执行与资源转入请求对应的资源转入业务;其中,步骤S906的具体实施方式参见步骤S106,这里不再赘述。If the response is determined, S906 is executed to trigger execution of the resource transfer service corresponding to the resource transfer request; wherein, for the specific implementation of step S906, refer to step S106, which will not be repeated here.

进一步的,考虑到针对资源转移风险极高的情况下,需要及时对目标账户进行管控,采用哪种管控方式可以根据确定出的资源转移风险程度来确定,实现在欺诈者进行资源销赃的过程中有针对性的对目标账户进行合理管控,基于此,如图11所示,在确定所述目标账户的资源转移风险监测结果之后,还包括:Further, considering that the target account needs to be managed and controlled in a timely manner when the risk of resource transfer is extremely high, the control method to be adopted can be determined according to the determined risk degree of resource transfer, so as to realize the fraudsters in the process of selling off resources. Targeted and reasonable management and control of the target account, based on this, as shown in Figure 11, after determining the resource transfer risk monitoring result of the target account, it also includes:

S907,判断确定出的资源转移风险监测结果是否满足预设条件;其中,该资源转移风险监测结果包括:各资源转移风险识别策略的识别结果。S907, determine whether the determined resource transfer risk monitoring result satisfies a preset condition; wherein, the resource transfer risk monitoring result includes: identification results of each resource transfer risk identification strategy.

若是,则执行S908,触发执行与该资源转移风险监测结果对应的转出管控方式对目标账户进行管控;其中,步骤S908的具体实施方式参见步骤S107至S108,这里不再赘述;If so, execute S908 to trigger the execution of the transfer-out management and control method corresponding to the resource transfer risk monitoring result to manage and control the target account; wherein, for the specific implementation of step S908, refer to steps S107 to S108, which will not be repeated here;

若否,则执行S909,触发执行与资源转出请求对应的资源转出业务。If not, execute S909 to trigger execution of the resource transfer-out service corresponding to the resource transfer-out request.

本申请实施例中的资源转移监测方法,利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;利用第二风险识别模型根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;利用第三风险识别模型根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果。本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the resource transfer monitoring method in the embodiment of the present application, the first risk identification model is used to identify the first risk of the target account according to the resource transfer request, and the first risk identification result is obtained; The target account performs second risk identification to obtain a second risk identification result; the third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result. In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

需要说明的是,本申请另一实施例与本申请一实施例基于同一发明构思,因此该实施例的具体实施可以参见前述资源转移监测方法的实施,重复之处不再赘述。It should be noted that another embodiment of the present application and an embodiment of the present application are based on the same inventive concept, so the specific implementation of this embodiment may refer to the implementation of the foregoing resource transfer monitoring method, and repeated details will not be repeated.

对应上述图1至图8描述的资源转移监测方法,基于相同的技术构思,本申请实施例还提供了一种资源转移监测装置,图12为本申请实施例提供的资源转移监测装置的第一种模块组成示意图,该装置用于执行图1至图8描述的资源转移监测方法,如图12所示,该装置包括:第一风险识别模块1201、第二风险识别模块1202和监测结果确定模块1203,第一风险识别模块1201、第二风险识别模块1202和监测结果确定模块1203依次连接。Corresponding to the resource transfer monitoring methods described above in FIGS. 1 to 8 , based on the same technical concept, an embodiment of the present application also provides a resource transfer monitoring device, and FIG. 12 is the first example of the resource transfer monitoring device provided by the embodiment of the present application. A schematic diagram of the composition of these modules, the device is used to execute the resource transfer monitoring method described in FIG. 1 to FIG. 8 , as shown in FIG. 12 , the device includes: a first risk identification module 1201, a second risk identification module 1202 and a monitoring result determination module 1203, the first risk identification module 1201, the second risk identification module 1202 and the monitoring result determination module 1203 are connected in sequence.

在一个具体的实施例中,第一风险识别模块1201,用于根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;In a specific embodiment, the first risk identification module 1201 is configured to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

第二风险识别模块1202,用于根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;The second risk identification module 1202 is configured to perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

监测结果确定模块1203,用于根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。The monitoring result determination module 1203 is configured to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

可选地,所述第一风险识别模块1201,具体用于:Optionally, the first risk identification module 1201 is specifically used for:

获取与资源转入请求相关的第一关联信息,其中,所述第一关联信息包括:发起账户信息、目标账户信息和第一资源转移信息中至少一种;Acquiring first associated information related to the resource transfer request, wherein the first associated information includes: at least one of initiating account information, target account information, and first resource transfer information;

利用神经网络模型根据所述第一关联信息,对目标账户进行第一风险识别,得到第一风险识别结果。A neural network model is used to perform first risk identification on the target account according to the first associated information, and a first risk identification result is obtained.

可选地,如图13所示,上述装置还包括:Optionally, as shown in Figure 13, the above-mentioned device further includes:

第一控制模块1204,用于根据所述第一风险识别结果,确定是否响应所述资源转入请求;若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。The first control module 1204 is configured to determine, according to the first risk identification result, whether to respond to the resource transfer request; if it is determined not to respond, trigger execution of the transfer control mode corresponding to the first risk identification result.

可选地,所述第二风险识别模块1202,具体用于:Optionally, the second risk identification module 1202 is specifically configured to:

获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括:目标账户信息、第二资源转移信息和接收账户信息中至少一种;Acquiring second association information related to the resource transfer-out request, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information;

利用梯度提升树模型根据所述第二关联信息,对目标账户进行第二风险识别,得到第二风险识别结果。The second risk identification is performed on the target account according to the second association information by using the gradient boosting tree model, and a second risk identification result is obtained.

可选地,所述监测结果确定模块1203,具体用于:Optionally, the monitoring result determination module 1203 is specifically used for:

根据在先得到的所述目标账户的多个第一风险识别结果,确定转入风险识别结果;Determine the transfer-in risk identification results according to the multiple first risk identification results of the target account obtained previously;

利用分类回归树模型根据所述转入风险识别结果和所述第二风险识别结果,确定至少一个资源转移风险识别策略;Use a classification regression tree model to determine at least one resource transfer risk identification strategy according to the transfer-in risk identification result and the second risk identification result;

如果所述资源转移风险识别策略中至少一个满足预设条件,则确定所述目标账户为风险账户。If at least one of the resource transfer risk identification strategies satisfies a preset condition, the target account is determined to be a risk account.

可选地,上述装置还包括:Optionally, the above device also includes:

第二控制模块1205,用于在确定所述目标账户为风险账户之后,根据所述满足预设条件的资源转移风险识别策略,确定所述目标账户的转出管控方式;触发执行所述转出管控方式对所述目标账户进行管控。The second control module 1205 is configured to, after determining that the target account is a risk account, according to the resource transfer risk identification strategy that satisfies the preset conditions, determine the transfer-out management and control method of the target account; trigger the execution of the transfer-out The management and control method is used to manage and control the target account.

本申请实施例中的资源转移监测装置,根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果。本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。The resource transfer monitoring device in the embodiment of the present application performs a first risk identification on a target account according to a resource transfer request to obtain a first risk identification result; and performs a second risk identification on the target account according to a resource transfer request to obtain a second risk Identification result; according to the first risk identification result and the second risk identification result, determine the resource transfer risk monitoring result of the target account. In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

在另一个具体的实施例中,第一风险识别模块1201,用于利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;In another specific embodiment, the first risk identification module 1201 is configured to use the first risk identification model to perform first risk identification on the target account according to the resource transfer request to obtain a first risk identification result;

第二风险识别模块1202,用于利用第二风险识别模型根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;The second risk identification module 1202 is configured to use the second risk identification model to perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

监测结果确定模块1203,用于利用第三风险识别模型根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。The monitoring result determination module 1203 is configured to use the third risk identification model to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

可选地,所述第一风险识别模型、所述第二风险识别模型和所述第二风险识别模型中至少一个满足下述条件:Optionally, at least one of the first risk identification model, the second risk identification model and the second risk identification model satisfies the following conditions:

所述第一风险识别模型为神经网络模型、所述第二风险识别模型为梯度提升树模型、或者所述第二风险识别模型为分类回归树模型。The first risk identification model is a neural network model, the second risk identification model is a gradient boosting tree model, or the second risk identification model is a classification regression tree model.

可选地,上述装置还包括:Optionally, the above device also includes:

第一控制模块1204,用于根据所述第一风险识别结果,确定是否响应所述资源转入请求;若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。The first control module 1204 is configured to determine, according to the first risk identification result, whether to respond to the resource transfer request; if it is determined not to respond, trigger execution of the transfer control mode corresponding to the first risk identification result.

可选地,上述装置还包括:Optionally, the above device also includes:

第二控制模块1205,用于若所述资源转移风险监测结果满足预设条件,则触发执行与所述资源转移风险监测结果对应的转出管控方式对所述目标账户进行管控。The second control module 1205 is configured to trigger the execution of a transfer-out control method corresponding to the resource transfer risk monitoring result to control the target account if the resource transfer risk monitoring result satisfies a preset condition.

本申请实施例中的资源转移监测装置,利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;利用第二风险识别模型根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;利用第三风险识别模型根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果。本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。The resource transfer monitoring device in the embodiment of the present application uses the first risk identification model to perform the first risk identification on the target account according to the resource transfer request, and obtains the first risk identification result; uses the second risk identification model to identify the target account according to the resource transfer request. The target account performs second risk identification to obtain a second risk identification result; the third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result. In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

需要说明的是,本申请实施例提供的资源转移监测装置与前述资源转移监测方法基于同一发明构思,因此该实施例的具体实施可以参见前述资源转移监测方法的实施,重复之处不再赘述。It should be noted that the resource transfer monitoring device provided by the embodiment of the present application and the aforementioned resource transfer monitoring method are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the aforementioned resource transfer monitoring method, and repeated details will not be repeated.

进一步地,对应上述图1至图8所示的方法,基于相同的技术构思,本申请实施例还提供了一种资源转移监测设备,该设备用于执行上述的资源转移监测方法,如图14所示。Further, corresponding to the methods shown in FIG. 1 to FIG. 8 above, based on the same technical concept, an embodiment of the present application further provides a resource transfer monitoring device, which is used to execute the above-mentioned resource transfer monitoring method, as shown in FIG. 14 . shown.

资源转移监测设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器1401和存储器1402,存储器1402中可以存储有一个或一个以上存储应用程序或数据。其中,存储器1402可以是短暂存储或持久存储。存储在存储器1402的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对资源转移监测设备中的一系列计算机可执行指令。更进一步地,处理器1401可以设置为与存储器1402通信,在资源转移监测设备上执行存储器1402中的一系列计算机可执行指令。资源转移监测设备还可以包括一个或一个以上电源1403,一个或一个以上有线或无线网络接口1404,一个或一个以上输入输出接口1405,一个或一个以上键盘1406等。The resource transfer monitoring devices may vary greatly due to different configurations or performances, and may include one or more processors 1401 and a memory 1402, and the memory 1402 may store one or more storage applications or data. Among them, the memory 1402 may be short-lived storage or persistent storage. The application program stored in the memory 1402 may include one or more modules (not shown), each module may include a series of computer-executable instructions in the resource transfer monitoring device. Still further, the processor 1401 may be arranged to communicate with the memory 1402 to execute a series of computer-executable instructions in the memory 1402 on the resource transfer monitoring device. The resource transfer monitoring device may also include one or more power supplies 1403, one or more wired or wireless network interfaces 1404, one or more input and output interfaces 1405, one or more keyboards 1406, and the like.

在一个具体的实施例中,资源转移监测设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对资源转移监测设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:In a specific embodiment, the resource transfer monitoring device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and Each module may include a series of computer-executable instructions in a resource transfer monitoring apparatus, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for:

根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Perform the first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result;

根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。According to the first risk identification result and the second risk identification result, the resource transfer risk monitoring result of the target account is determined.

本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

可选地,计算机可执行指令在被执行时,所述根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果,包括:Optionally, when the computer-executable instruction is executed, the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained, including:

获取与资源转入请求相关的第一关联信息,其中,所述第一关联信息包括:发起账户信息、目标账户信息和第一资源转移信息中至少一种;Acquiring first associated information related to the resource transfer request, wherein the first associated information includes: at least one of initiating account information, target account information, and first resource transfer information;

利用神经网络模型根据所述第一关联信息,对目标账户进行第一风险识别,得到第一风险识别结果。A neural network model is used to perform first risk identification on the target account according to the first associated information, and a first risk identification result is obtained.

可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:Optionally, the computer-executable instructions, when executed, also include computer-executable instructions for performing the following:

在根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:After the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained, the method further includes:

根据所述第一风险识别结果,确定是否响应所述资源转入请求;According to the first risk identification result, determine whether to respond to the resource transfer request;

若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。If it is determined that there is no response, trigger execution of the transfer-in control method corresponding to the first risk identification result.

可选地,计算机可执行指令在被执行时,所述根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果,包括:Optionally, when the computer-executable instruction is executed, the second risk identification is performed on the target account according to the resource transfer request to obtain a second risk identification result, including:

获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括:目标账户信息、第二资源转移信息和接收账户信息中至少一种;Acquiring second association information related to the resource transfer-out request, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information;

利用梯度提升树模型根据所述第二关联信息,对目标账户进行第二风险识别,得到第二风险识别结果。The second risk identification is performed on the target account according to the second association information by using the gradient boosting tree model, and a second risk identification result is obtained.

可选地,计算机可执行指令在被执行时,所述根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果,包括:Optionally, when the computer-executable instruction is executed, the determination of the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result includes:

根据在先得到的所述目标账户的多个第一风险识别结果,确定转入风险识别结果;Determine the transfer-in risk identification results according to the multiple first risk identification results of the target account obtained previously;

利用分类回归树模型根据所述转入风险识别结果和所述第二风险识别结果,确定至少一个资源转移风险识别策略;Use a classification regression tree model to determine at least one resource transfer risk identification strategy according to the transfer-in risk identification result and the second risk identification result;

如果所述资源转移风险识别策略中至少一个满足预设条件,则确定所述目标账户为风险账户。If at least one of the resource transfer risk identification strategies satisfies a preset condition, the target account is determined to be a risk account.

可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:Optionally, the computer-executable instructions, when executed, also include computer-executable instructions for performing the following:

在确定所述目标账户为风险账户之后,还包括:After determining that the target account is a risk account, the method further includes:

根据所述满足预设条件的资源转移风险识别策略,确定所述目标账户的转出管控方式;According to the resource transfer risk identification strategy that satisfies the preset conditions, determine the transfer control method of the target account;

触发执行所述转出管控方式对所述目标账户进行管控。Trigger to execute the transfer-out control method to control the target account.

本申请实施例中的资源转移监测设备,根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果。可见,通过本申请实施例中的资源转移监测设备,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。The resource transfer monitoring device in the embodiment of the present application performs first risk identification on the target account according to the resource transfer request, and obtains the first risk identification result; and performs second risk identification on the target account according to the resource transfer request, and obtains the second risk Identification result; according to the first risk identification result and the second risk identification result, determine the resource transfer risk monitoring result of the target account. It can be seen that through the resource transfer monitoring device in the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent sales of stolen goods can be detected in time, so as to minimize the losses of victims. The identification result and the transfer-out risk identification result determine the final resource transfer risk monitoring result, which improves the accuracy of the determination of fraudulent sales of stolen goods.

在另一个具体的实施例中,资源转移监测设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对资源转移监测设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:In another specific embodiment, the resource transfer monitoring device includes a memory, and one or more programs, wherein one or more programs are stored in the memory, and the one or more programs may include one or more modules, And each module may include a series of computer-executable instructions in a resource transfer monitoring apparatus, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for:

利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the first risk identification model to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

利用第二风险识别模型根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Use the second risk identification model to perform second risk identification on the target account according to the resource transfer request, and obtain a second risk identification result;

利用第三风险识别模型根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结。The third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

可选地,计算机可执行指令在被执行时,所述第一风险识别模型、所述第二风险识别模型和所述第二风险识别模型中至少一个满足下述条件:Optionally, when the computer-executable instructions are executed, at least one of the first risk identification model, the second risk identification model and the second risk identification model satisfies the following conditions:

所述第一风险识别模型为神经网络模型、所述第二风险识别模型为梯度提升树模型、或者所述第二风险识别模型为分类回归树模型。The first risk identification model is a neural network model, the second risk identification model is a gradient boosting tree model, or the second risk identification model is a classification regression tree model.

可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:Optionally, the computer-executable instructions, when executed, also include computer-executable instructions for performing the following:

在利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:After the first risk identification model is used to identify the target account according to the resource transfer request, and the first risk identification result is obtained, the method further includes:

根据所述第一风险识别结果,确定是否响应所述资源转入请求;According to the first risk identification result, determine whether to respond to the resource transfer request;

若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。If it is determined that there is no response, trigger execution of the transfer-in control method corresponding to the first risk identification result.

可选地,计算机可执行指令在被执行时,还包含用于进行以下计算机可执行指令:Optionally, the computer-executable instructions, when executed, also include computer-executable instructions for performing the following:

在确定所述目标账户的资源转移风险监测结果之后,还包括:After determining the resource transfer risk monitoring result of the target account, the method further includes:

若所述资源转移风险监测结果满足预设条件,则触发执行与所述资源转移风险监测结果对应的转出管控方式对所述目标账户进行管控。If the resource transfer risk monitoring result satisfies a preset condition, triggering and executing a transfer-out management and control method corresponding to the resource transfer risk monitoring result to manage and control the target account.

本申请实施例中的资源转移监测设备,利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;利用第二风险识别模型根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;利用第三风险识别模型根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果。可见,通过本申请实施例中的资源转移监测设备,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。The resource transfer monitoring device in the embodiment of the present application uses the first risk identification model to perform the first risk identification on the target account according to the resource transfer request, and obtains the first risk identification result; uses the second risk identification model to identify the target account according to the resource transfer request. The target account performs second risk identification to obtain a second risk identification result; the third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result. It can be seen that through the resource transfer monitoring device in the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent sales of stolen goods can be detected in time, so as to minimize the losses of victims. The identification result and the transfer-out risk identification result determine the final resource transfer risk monitoring result, which improves the accuracy of the determination of fraudulent sales of stolen goods.

需要说明的是,本申请实施例提供的资源转移监测设备与前述资源转移监测方法基于同一发明构思,因此该实施例的具体实施可以参见前述资源转移监测方法的实施,重复之处不再赘述。It should be noted that the resource transfer monitoring device provided by the embodiment of the present application and the aforementioned resource transfer monitoring method are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the aforementioned resource transfer monitoring method, and repeated details will not be repeated.

进一步地,对应上述图1至图8所示的方法,基于相同的技术构思,本申请实施例还提供了一种存储介质,用于存储计算机可执行指令,一种具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:Further, corresponding to the methods shown in FIG. 1 to FIG. 8 above, based on the same technical concept, an embodiment of the present application further provides a storage medium for storing computer-executable instructions. In a specific embodiment, the The storage medium can be a U disk, an optical disk, a hard disk, etc., when the computer-executable instructions stored in the storage medium are executed by the processor, the following processes can be implemented:

根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Perform the first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result;

根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Perform second risk identification on the target account according to the resource transfer request to obtain a second risk identification result;

根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果。According to the first risk identification result and the second risk identification result, the resource transfer risk monitoring result of the target account is determined.

本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果,包括:Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained, including:

获取与资源转入请求相关的第一关联信息,其中,所述第一关联信息包括:发起账户信息、目标账户信息和第一资源转移信息中至少一种;Acquiring first associated information related to the resource transfer request, wherein the first associated information includes: at least one of initiating account information, target account information, and first resource transfer information;

利用神经网络模型根据所述第一关联信息,对目标账户进行第一风险识别,得到第一风险识别结果。A neural network model is used to perform first risk identification on the target account according to the first associated information, and a first risk identification result is obtained.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented:

在根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:After the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained, the method further includes:

根据所述第一风险识别结果,确定是否响应所述资源转入请求;According to the first risk identification result, determine whether to respond to the resource transfer request;

若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。If it is determined that there is no response, trigger execution of the transfer-in control method corresponding to the first risk identification result.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果,包括:Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the second risk identification is performed on the target account according to the resource transfer request to obtain a second risk identification result, including:

获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括:目标账户信息、第二资源转移信息和接收账户信息中至少一种;Acquiring second association information related to the resource transfer-out request, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information;

利用梯度提升树模型根据所述第二关联信息,对目标账户进行第二风险识别,得到第二风险识别结果。The second risk identification is performed on the target account according to the second association information by using the gradient boosting tree model, and a second risk identification result is obtained.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结果,包括:Optionally, when the computer-executable instruction stored in the storage medium is executed by the processor, the resource transfer risk monitoring result of the target account is determined according to the first risk identification result and the second risk identification result. ,include:

根据在先得到的所述目标账户的多个第一风险识别结果,确定转入风险识别结果;Determine the transfer-in risk identification results according to the multiple first risk identification results of the target account obtained previously;

利用分类回归树模型根据所述转入风险识别结果和所述第二风险识别结果,确定至少一个资源转移风险识别策略;Use a classification regression tree model to determine at least one resource transfer risk identification strategy according to the transfer-in risk identification result and the second risk identification result;

如果所述资源转移风险识别策略中至少一个满足预设条件,则确定所述目标账户为风险账户。If at least one of the resource transfer risk identification strategies satisfies a preset condition, the target account is determined to be a risk account.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented:

在确定所述目标账户为风险账户之后,还包括:After determining that the target account is a risk account, the method further includes:

根据所述满足预设条件的资源转移风险识别策略,确定所述目标账户的转出管控方式;According to the resource transfer risk identification strategy that satisfies the preset conditions, determine the transfer control method of the target account;

触发执行所述转出管控方式对所述目标账户进行管控。Trigger to execute the transfer-out control method to control the target account.

本申请实施例中的存储介质存储的计算机可执行指令在被处理器执行时,根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;根据第一风险识别结果和第二风险识别结果,确定目标账户的资源转移风险监测结果。可见,通过本申请实施例中的存储介质,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。When the computer-executable instructions stored in the storage medium in the embodiments of the present application are executed by the processor, the first risk identification is performed on the target account according to the resource transfer request, and the first risk identification result is obtained; the target account is identified according to the resource transfer request. A second risk identification is performed to obtain a second risk identification result; according to the first risk identification result and the second risk identification result, the resource transfer risk monitoring result of the target account is determined. It can be seen that through the storage medium in the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent sales of stolen goods can be detected in time, so as to minimize the losses of victims. And transfer out risk identification results, determine the final resource transfer risk monitoring results, improve the accuracy of fraudulent sales of stolen goods.

在另一个具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:In another specific embodiment, the storage medium can be a U disk, an optical disk, a hard disk, etc., and the computer-executable instructions stored in the storage medium can implement the following processes when executed by the processor:

利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the first risk identification model to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result;

利用第二风险识别模型根据资源转出请求对所述目标账户进行第二风险识别,得到第二风险识别结果;Use the second risk identification model to perform second risk identification on the target account according to the resource transfer request, and obtain a second risk identification result;

利用第三风险识别模型根据所述第一风险识别结果和所述第二风险识别结果,确定所述目标账户的资源转移风险监测结。The third risk identification model is used to determine the resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.

本申请实施例中,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。In the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent and stolen stolen goods can be detected in time, so as to minimize the losses of victims. , to determine the final resource transfer risk monitoring result, and improve the accuracy of the determination of fraudulent sale of stolen goods.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述第一风险识别模型、所述第二风险识别模型和所述第二风险识别模型中至少一个满足下述条件:Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, at least one of the first risk identification model, the second risk identification model, and the second risk identification model satisfies the following conditions: :

所述第一风险识别模型为神经网络模型、所述第二风险识别模型为梯度提升树模型、或者所述第二风险识别模型为分类回归树模型。The first risk identification model is a neural network model, the second risk identification model is a gradient boosting tree model, or the second risk identification model is a classification regression tree model.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented:

在利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:After the first risk identification model is used to identify the target account according to the resource transfer request, and the first risk identification result is obtained, the method further includes:

根据所述第一风险识别结果,确定是否响应所述资源转入请求;According to the first risk identification result, determine whether to respond to the resource transfer request;

若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。If it is determined that there is no response, trigger execution of the transfer-in control method corresponding to the first risk identification result.

可选地,该存储介质存储的计算机可执行指令在被处理器执行时,还实现以下流程:Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented:

在确定所述目标账户的资源转移风险监测结果之后,还包括:After determining the resource transfer risk monitoring result of the target account, the method further includes:

若所述资源转移风险监测结果满足预设条件,则触发执行与所述资源转移风险监测结果对应的转出管控方式对所述目标账户进行管控。If the resource transfer risk monitoring result satisfies a preset condition, triggering and executing a transfer-out management and control method corresponding to the resource transfer risk monitoring result to manage and control the target account.

本申请实施例中的存储介质存储的计算机可执行指令在被处理器执行时,利用第一风险识别模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;利用第二风险识别模型根据资源转出请求对目标账户进行第二风险识别,得到第二风险识别结果;利用第三风险识别模型根据上述第一风险识别结果和上述第二风险识别结果,确定目标账户的资源转移风险监测结果。可见,通过本申请实施例中的存储介质,能够自动对目标账户的实时资源转移进行监控,及时发现存在欺诈销赃行为的可疑账户,最大限度地减少受害者损失,同时,结合转入风险识别结果和转出风险识别结果,确定最终的资源转移风险监测结果,提高了欺诈销赃行为判定的准确度。When the computer-executable instructions stored in the storage medium in the embodiments of the present application are executed by the processor, the first risk identification model is used to identify the target account according to the resource transfer request, and the first risk identification result is obtained; The second risk identification model performs the second risk identification on the target account according to the resource transfer request, and obtains the second risk identification result; the third risk identification model is used to determine the target account's Resource transfer risk monitoring results. It can be seen that through the storage medium in the embodiment of the present application, the real-time resource transfer of the target account can be automatically monitored, and suspicious accounts with fraudulent sales of stolen goods can be detected in time, so as to minimize the losses of victims. And transfer out risk identification results, determine the final resource transfer risk monitoring results, improve the accuracy of fraudulent sales of stolen goods.

需要说明的是,本申请实施例提供的存储介质与前述资源转移监测方法基于同一发明构思,因此该实施例的具体实施可以参见前述资源转移监测方法的实施,重复之处不再赘述。It should be noted that the storage medium provided in this embodiment of the present application and the foregoing resource transfer monitoring method are based on the same inventive concept, so the specific implementation of this embodiment may refer to the implementation of the foregoing resource transfer monitoring method, and repeated details will not be repeated.

在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable GateArray,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware DescriptionLanguage)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(RubyHardware Description Language)等,目前最普遍使用的是VHDL(Very-High-SpeedIntegrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, improvements in a technology could be clearly differentiated between improvements in hardware (eg, improvements to circuit structures such as diodes, transistors, switches, etc.) or improvements in software (improvements in method flow). However, with the development of technology, the improvement of many methods and processes today can be regarded as a direct improvement of the hardware circuit structure. Designers almost get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware entity modules. For example, a Programmable Logic Device (PLD) (eg, Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by user programming of the device. It is programmed by the designer to "integrate" a digital system on a PLD without having to ask the chip manufacturer to design and manufacture a dedicated integrated circuit chip. And, instead of making integrated circuit chips by hand, these days, much of this programming is done using software called a "logic compiler", which is similar to the software compiler used in program development and writing, but before compiling The original code also has to be written in a specific programming language, which is called Hardware Description Language (HDL), and there is not only one HDL, but many kinds, such as ABEL (Advanced Boolean Expression Language) , AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (RubyHardware Description Language), etc. The most commonly used are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be clear to those skilled in the art that a hardware circuit for implementing the logic method process can be easily obtained by simply programming the method process in the above-mentioned several hardware description languages and programming it into the integrated circuit.

控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of eg a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory. Those skilled in the art also know that, in addition to implementing the controller in the form of pure computer-readable program code, the controller can be implemented as logic gates, switches, application-specific integrated circuits, programmable logic controllers and embedded devices by logically programming the method steps. The same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included therein for realizing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as both a software module implementing a method and a structure within a hardware component.

上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules or units described in the above embodiments may be specifically implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.

为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above device, the functions are divided into various units and described respectively. Of course, when implementing the present application, the functions of each unit may be implemented in one or more software and/or hardware.

本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by those skilled in the art, the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.

在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.

内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-persistent memory in computer readable media, random access memory (RAM) and/or non-volatile memory in the form of, for example, read only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.

计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media includes both persistent and non-permanent, removable and non-removable media, and storage of information may be implemented by any method or technology. Information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, excludes transitory computer-readable media, such as modulated data signals and carrier waves.

还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device comprising a series of elements includes not only those elements, but also Other elements not expressly listed, or which are inherent to such a process, method, article of manufacture, or apparatus are also included. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in the process, method, article of manufacture or device that includes the element.

本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。It will be appreciated by those skilled in the art that the embodiments of the present application may be provided as a method, a system or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for related parts, please refer to the partial descriptions of the method embodiments.

以上所述仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。The above descriptions are merely examples of the present application, and are not intended to limit the present application. Various modifications and variations of this application are possible for those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included within the scope of the claims of this application.

Claims (18)

1.一种资源转移监测方法,其特征在于,包括:1. a resource transfer monitoring method, is characterized in that, comprises: 根据资源转入请求,利用神经网络模型对目标账户进行第一风险识别,得到第一风险识别结果;According to the resource transfer request, use the neural network model to identify the first risk of the target account, and obtain the first risk identification result; 获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种;acquiring second association information related to the resource transfer-out request, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information; 利用梯度提升树模型根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;Using a gradient boosting tree model to perform second risk identification on the target account according to the second associated information, to obtain a second risk identification result; 根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果。Determine the transfer-in risk identification result according to the first risk identification result, use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine a resource transfer risk identification strategy. A transfer risk identification strategy is used to determine the resource transfer risk monitoring result of the target account. 2.根据权利要求1所述的方法,其特征在于,所述根据资源转入请求,利用神经网络模型对目标账户进行第一风险识别,得到第一风险识别结果,包括:2. The method according to claim 1, wherein, according to the resource transfer request, the first risk identification is performed on the target account by using a neural network model, and the first risk identification result is obtained, comprising: 获取与资源转入请求相关的第一关联信息,其中,所述第一关联信息包括:发起账户信息、目标账户信息和第一资源转移信息中至少一种;Acquiring first associated information related to the resource transfer request, wherein the first associated information includes: at least one of initiating account information, target account information, and first resource transfer information; 利用神经网络模型根据所述第一关联信息,对目标账户进行第一风险识别,得到第一风险识别结果。A neural network model is used to perform first risk identification on the target account according to the first associated information, and a first risk identification result is obtained. 3.根据权利要求1所述的方法,其特征在于,在根据资源转入请求,利用神经网络模型对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:3. The method according to claim 1, characterized in that, after the first risk identification is performed on the target account by using a neural network model according to the resource transfer request, and the first risk identification result is obtained, the method further comprises: 根据所述第一风险识别结果,确定是否响应所述资源转入请求;According to the first risk identification result, determine whether to respond to the resource transfer request; 若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。If it is determined that there is no response, trigger execution of the transfer-in control method corresponding to the first risk identification result. 4.根据权利要求1所述的方法,其特征在于,所述根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果,包括:4. The method according to claim 1, characterized in that, according to the first risk identification result, the transfer-in risk identification result is determined, and a classification regression tree model is used to convert the transfer-in risk identification result and the second risk identification result. The risk identification results are correlated to determine a resource transfer risk identification strategy, and according to the resource transfer risk identification strategy, the resource transfer risk monitoring result of the target account is determined, including: 根据在先得到的所述目标账户的多个第一风险识别结果,确定转入风险识别结果;Determine the transfer-in risk identification results according to the multiple first risk identification results of the target account obtained previously; 利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定至少一个资源转移风险识别策略;Use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine at least one resource transfer risk identification strategy; 如果所述资源转移风险识别策略中至少一个满足预设条件,则确定所述目标账户为风险账户。If at least one of the resource transfer risk identification strategies satisfies a preset condition, the target account is determined to be a risk account. 5.根据权利要求4所述的方法,其特征在于,在确定所述目标账户为风险账户之后,还包括:5. The method according to claim 4, characterized in that, after determining that the target account is a risk account, the method further comprises: 根据所述满足预设条件的资源转移风险识别策略,确定所述目标账户的转出管控方式;According to the resource transfer risk identification strategy that satisfies the preset conditions, determine the transfer control method of the target account; 触发执行所述转出管控方式对所述目标账户进行管控。Trigger to execute the transfer-out control method to control the target account. 6.一种资源转移监测方法,其特征在于,包括:6. A resource transfer monitoring method, comprising: 利用神经网络模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the neural network model to perform first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result; 利用梯度提升树模型获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种,并根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;The second association information related to the resource transfer request is obtained by using a gradient boosting tree model, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information, and according to the The second associated information performs second risk identification on the target account to obtain a second risk identification result; 根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果;Determine the transfer-in risk identification result according to the first risk identification result, use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine a resource transfer risk identification strategy. Transfer risk identification strategy, determine the resource transfer risk monitoring result of the target account; 若所述资源转移风险监测结果满足预设条件,则触发执行与所述资源转移风险监测结果对应的转出管控方式对所述目标账户进行管控。If the resource transfer risk monitoring result satisfies a preset condition, triggering and executing a transfer-out management and control method corresponding to the resource transfer risk monitoring result to manage and control the target account. 7.根据权利要求6所述的方法,其特征在于,在利用神经网络模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果之后,还包括:7. The method according to claim 6, characterized in that, after utilizing the neural network model to perform the first risk identification on the target account according to the resource transfer request, and after obtaining the first risk identification result, the method further comprises: 根据所述第一风险识别结果,确定是否响应所述资源转入请求;According to the first risk identification result, determine whether to respond to the resource transfer request; 若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。If it is determined that there is no response, trigger execution of the transfer-in control method corresponding to the first risk identification result. 8.一种资源转移监测装置,其特征在于,包括:8. A resource transfer monitoring device, comprising: 第一风险识别模块,用于根据资源转入请求,利用神经网络模型对目标账户进行第一风险识别,得到第一风险识别结果;a first risk identification module, configured to perform first risk identification on the target account by using a neural network model according to the resource transfer request, and obtain a first risk identification result; 第二关联信息获取模块,用于获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种;A second associated information obtaining module, configured to obtain second associated information related to the resource transfer out request, wherein the second associated information includes at least one of target account information, second resource transfer information and receiving account information; 第二风险识别模块,用于利用梯度提升树模型根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;A second risk identification module, configured to use a gradient boosting tree model to perform second risk identification on the target account according to the second associated information to obtain a second risk identification result; 监测结果确定模块,用于根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果。The monitoring result determination module is used to determine the transfer-in risk identification result according to the first risk identification result, and use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result to determine the resource transfer risk An identification strategy, according to the resource transfer risk identification strategy, to determine the resource transfer risk monitoring result of the target account. 9.根据权利要求8所述的装置,其特征在于,所述第一风险识别模块,具体用于:9. The device according to claim 8, wherein the first risk identification module is specifically used for: 获取与资源转入请求相关的第一关联信息,其中,所述第一关联信息包括:发起账户信息、目标账户信息和第一资源转移信息中至少一种;Acquiring first associated information related to the resource transfer request, wherein the first associated information includes: at least one of initiating account information, target account information, and first resource transfer information; 利用神经网络模型根据所述第一关联信息,对目标账户进行第一风险识别,得到第一风险识别结果。A neural network model is used to perform first risk identification on the target account according to the first associated information, and a first risk identification result is obtained. 10.根据权利要求8所述的装置,其特征在于,还包括:10. The apparatus of claim 8, further comprising: 第一控制模块,用于根据所述第一风险识别结果,确定是否响应所述资源转入请求;若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。The first control module is configured to determine whether to respond to the resource transfer request according to the first risk identification result; if it is determined not to respond, trigger execution of the transfer control mode corresponding to the first risk identification result. 11.根据权利要求8所述的装置,其特征在于,所述监测结果确定模块,具体用于:11. The device according to claim 8, wherein the monitoring result determination module is specifically used for: 根据在先得到的所述目标账户的多个第一风险识别结果,确定转入风险识别结果;Determine the transfer-in risk identification results according to the multiple first risk identification results of the target account obtained previously; 利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定至少一个资源转移风险识别策略;Use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine at least one resource transfer risk identification strategy; 如果所述资源转移风险识别策略中至少一个满足预设条件,则确定所述目标账户为风险账户。If at least one of the resource transfer risk identification strategies satisfies a preset condition, the target account is determined to be a risk account. 12.根据权利要求11所述的装置,其特征在于,还包括:12. The apparatus of claim 11, further comprising: 第二控制模块,用于在确定所述目标账户为风险账户之后,根据所述满足预设条件的资源转移风险识别策略,确定所述目标账户的转出管控方式;触发执行所述转出管控方式对所述目标账户进行管控。The second control module is configured to, after determining that the target account is a risk account, according to the resource transfer risk identification strategy that satisfies the preset conditions, determine the transfer-out management and control mode of the target account; trigger the execution of the transfer-out management and control way to manage and control the target account. 13.一种资源转移监测装置,其特征在于,包括:13. A resource transfer monitoring device, comprising: 第一风险识别模块,用于利用神经网络模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;a first risk identification module, configured to use a neural network model to perform first risk identification on the target account according to the resource transfer request, and obtain a first risk identification result; 第二风险识别模块,用于利用梯度提升树模型获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种,并根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;The second risk identification module is configured to obtain the second association information related to the resource transfer request by using the gradient boosting tree model, wherein the second association information includes the target account information, the second resource transfer information and the receiving account information. at least one, and perform second risk identification on the target account according to the second associated information to obtain a second risk identification result; 监测结果确定模块,用于根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果;The monitoring result determination module is used to determine the transfer-in risk identification result according to the first risk identification result, and use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result to determine the resource transfer risk an identification strategy, according to the resource transfer risk identification strategy, to determine the resource transfer risk monitoring result of the target account; 第二控制模块,用于若所述资源转移风险监测结果满足预设条件,则触发执行与所述资源转移风险监测结果对应的转出管控方式对所述目标账户进行管控。The second control module is configured to trigger the execution of a transfer-out management and control method corresponding to the resource transfer risk monitoring result to control the target account if the resource transfer risk monitoring result satisfies a preset condition. 14.根据权利要求13所述的装置,其特征在于,还包括:14. The apparatus of claim 13, further comprising: 第一控制模块,用于根据所述第一风险识别结果,确定是否响应所述资源转入请求;若确定不响应,则触发执行与所述第一风险识别结果对应的转入管控方式。The first control module is configured to determine whether to respond to the resource transfer request according to the first risk identification result; if it is determined not to respond, trigger execution of the transfer control mode corresponding to the first risk identification result. 15. 一种资源转移监测设备,其特征在于,包括:15. A resource transfer monitoring device, comprising: 处理器;以及processor; and 被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to: 根据资源转入请求,利用神经网络模型对目标账户进行第一风险识别,得到第一风险识别结果;According to the resource transfer request, use the neural network model to identify the first risk of the target account, and obtain the first risk identification result; 获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种;acquiring second association information related to the resource transfer-out request, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information; 利用梯度提升树模型根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;Using a gradient boosting tree model to perform second risk identification on the target account according to the second associated information, to obtain a second risk identification result; 根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果。Determine the transfer-in risk identification result according to the first risk identification result, use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine a resource transfer risk identification strategy. A transfer risk identification strategy is used to determine the resource transfer risk monitoring result of the target account. 16. 一种资源转移监测设备,其特征在于,包括:16. A resource transfer monitoring device, comprising: 处理器;以及processor; and 被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to: 利用神经网络模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the neural network model to perform first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result; 利用梯度提升树模型获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种,并根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;The second association information related to the resource transfer request is obtained by using a gradient boosting tree model, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information, and according to the The second associated information performs second risk identification on the target account to obtain a second risk identification result; 根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果;Determine the transfer-in risk identification result according to the first risk identification result, use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine a resource transfer risk identification strategy. Transfer risk identification strategy, determine the resource transfer risk monitoring result of the target account; 若所述资源转移风险监测结果满足预设条件,则触发执行与所述资源转移风险监测结果对应的转出管控方式对所述目标账户进行管控。If the resource transfer risk monitoring result satisfies a preset condition, triggering the execution of a transfer-out management and control method corresponding to the resource transfer risk monitoring result to manage and control the target account. 17.一种存储介质,用于存储计算机可执行指令,其特征在于,所述可执行指令在被执行时实现以下流程:17. A storage medium for storing computer-executable instructions, wherein the executable instructions implement the following processes when executed: 根据资源转入请求,利用神经网络模型对目标账户进行第一风险识别,得到第一风险识别结果;According to the resource transfer request, use the neural network model to identify the first risk of the target account, and obtain the first risk identification result; 获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种;acquiring second association information related to the resource transfer-out request, wherein the second association information includes at least one of target account information, second resource transfer information, and receiving account information; 利用梯度提升树模型根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;Using a gradient boosting tree model to perform second risk identification on the target account according to the second associated information, to obtain a second risk identification result; 根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果。Determine the transfer-in risk identification result according to the first risk identification result, use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine a resource transfer risk identification strategy. A transfer risk identification strategy is used to determine the resource transfer risk monitoring result of the target account. 18.一种存储介质,用于存储计算机可执行指令,其特征在于,所述可执行指令在被执行时实现以下流程:18. A storage medium for storing computer-executable instructions, wherein the executable instructions implement the following processes when executed: 利用神经网络模型根据资源转入请求对目标账户进行第一风险识别,得到第一风险识别结果;Use the neural network model to perform first risk identification on the target account according to the resource transfer request, and obtain the first risk identification result; 利用梯度提升树模型获取与资源转出请求相关的第二关联信息,其中,所述第二关联信息包括目标账户信息、第二资源转移信息和接收账户信息中的至少一种,并根据所述第二关联信息对所述目标账户进行第二风险识别,得到第二风险识别结果;The second association information related to the resource transfer request is obtained by using the gradient boosting tree model, wherein the second association information includes at least one of target account information, second resource transfer information and receiving account information, and according to the The second associated information performs second risk identification on the target account to obtain a second risk identification result; 根据所述第一风险识别结果确定转入风险识别结果,利用分类回归树模型将所述转入风险识别结果和所述第二风险识别结果进行关联,确定资源转移风险识别策略,根据所述资源转移风险识别策略,确定所述目标账户的资源转移风险监测结果;Determine the transfer-in risk identification result according to the first risk identification result, use a classification regression tree model to associate the transfer-in risk identification result with the second risk identification result, and determine a resource transfer risk identification strategy. Transfer risk identification strategy, determine the resource transfer risk monitoring result of the target account; 若所述资源转移风险监测结果满足预设条件,则触发执行与所述资源转移风险监测结果对应的转出管控方式对所述目标账户进行管控。If the resource transfer risk monitoring result satisfies a preset condition, triggering and executing a transfer-out management and control method corresponding to the resource transfer risk monitoring result to manage and control the target account.
CN201810144895.4A 2018-02-12 2018-02-12 A resource transfer monitoring method and device Active CN108492104B (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN201810144895.4A CN108492104B (en) 2018-02-12 2018-02-12 A resource transfer monitoring method and device
TW107146357A TWI698770B (en) 2018-02-12 2018-12-21 Resource transfer monitoring method, device, monitoring equipment and storage media
SG11202006760TA SG11202006760TA (en) 2018-02-12 2019-01-25 Resource transferring monitoring method and device
PCT/CN2019/073130 WO2019154115A1 (en) 2018-02-12 2019-01-25 Resource transferring monitoring method and device
US16/911,089 US11526889B2 (en) 2018-02-12 2020-06-24 Resource transferring monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810144895.4A CN108492104B (en) 2018-02-12 2018-02-12 A resource transfer monitoring method and device

Publications (2)

Publication Number Publication Date
CN108492104A CN108492104A (en) 2018-09-04
CN108492104B true CN108492104B (en) 2020-10-02

Family

ID=63340401

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810144895.4A Active CN108492104B (en) 2018-02-12 2018-02-12 A resource transfer monitoring method and device

Country Status (5)

Country Link
US (1) US11526889B2 (en)
CN (1) CN108492104B (en)
SG (1) SG11202006760TA (en)
TW (1) TWI698770B (en)
WO (1) WO2019154115A1 (en)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108492104B (en) * 2018-02-12 2020-10-02 阿里巴巴集团控股有限公司 A resource transfer monitoring method and device
CN109376999A (en) * 2018-09-20 2019-02-22 阿里巴巴集团控股有限公司 A kind of management-control method of transaction, device and equipment
CN109064072A (en) * 2018-09-20 2018-12-21 阿里巴巴集团控股有限公司 The method, apparatus and electronic equipment of risk control
CN109598511B (en) * 2018-11-05 2023-06-20 创新先进技术有限公司 An account risk identification method, device and equipment
CN110033268B (en) * 2019-02-26 2024-01-09 创新先进技术有限公司 Risk control methods, devices and equipment in transfers
US12229777B1 (en) * 2019-03-01 2025-02-18 Intuit Inc. Method and system for detecting fraudulent transactions in information technology networks
CN110222880B (en) * 2019-05-20 2023-12-19 创新先进技术有限公司 Business risk determination methods, model training methods and data processing methods
CN110348834A (en) * 2019-05-27 2019-10-18 平安银行股份有限公司 Resource transfers method, apparatus, electronic equipment and medium based on speech recognition
CN110418173B (en) * 2019-07-18 2021-10-08 北京达佳互联信息技术有限公司 Method, device, server and storage medium for determining abnormal account
CN110490595B (en) * 2019-07-26 2023-08-25 创新先进技术有限公司 A risk control method and device
CN110399925B (en) * 2019-07-26 2023-09-19 腾讯科技(武汉)有限公司 Account risk identification method, device and storage medium
CN111047426A (en) * 2019-11-26 2020-04-21 智器云南京信息科技有限公司 Method, system and storage medium for analyzing suspicious account based on fund transaction
CN110895757B (en) * 2019-11-29 2022-09-30 中国银行股份有限公司 Cheating data identification method, device, equipment and system
WO2021126302A1 (en) * 2019-12-18 2021-06-24 Wizz Systems Llc System and method for measuring and sharing marine activity information
CN111309495B (en) * 2020-02-03 2023-07-14 支付宝(杭州)信息技术有限公司 Batch processing request initiation method, device, risk identification device, and storage medium
US10958784B1 (en) * 2020-03-11 2021-03-23 Capital One Services, Llc Performing a custom action during call screening based on a purpose of a voice call
CN111432227B (en) * 2020-03-27 2021-12-03 广州酷狗计算机科技有限公司 Virtual resource transfer risk determination method, device, server and storage medium
CN111523904A (en) * 2020-04-26 2020-08-11 支付宝实验室(新加坡)有限公司 Method, device and equipment for triggering resource transfer task
CN111523903A (en) * 2020-04-26 2020-08-11 支付宝实验室(新加坡)有限公司 Method, device and equipment for triggering resource transfer task
CN113971038B (en) * 2020-07-22 2024-07-02 北京达佳互联信息技术有限公司 Abnormality identification method and device for application account, server and storage medium
CN111861252B (en) * 2020-07-29 2024-06-14 北京达佳互联信息技术有限公司 Electronic resource transmission method, device and server
CN114282924B (en) * 2020-09-28 2024-05-28 腾讯科技(深圳)有限公司 Account identification method, device, equipment and storage medium
CN112465512B (en) * 2020-11-25 2024-10-08 广州羊城通有限公司 Recharging and withdrawing control method and device for rechargeable card
CN112491900B (en) * 2020-11-30 2023-04-18 中国银联股份有限公司 Abnormal node identification method, device, equipment and medium
CN112529639B (en) * 2020-12-23 2024-09-20 中国银联股份有限公司 Abnormal account identification method, device, equipment and medium
CN112884478B (en) * 2021-01-26 2023-05-23 支付宝(中国)网络技术有限公司 Data processing method, device and equipment
CN113034123B (en) * 2021-02-19 2024-03-12 腾讯科技(深圳)有限公司 Abnormal resource transfer identification method and device, electronic equipment and readable storage medium
CN113762974B (en) * 2021-05-25 2025-06-27 腾讯科技(深圳)有限公司 Data processing method, device, equipment and storage medium
CN113537960B (en) * 2021-07-19 2024-08-06 中国工商银行股份有限公司 Determination method, device and equipment for abnormal resource transfer link
US20240211950A1 (en) * 2021-08-31 2024-06-27 Rakuten Group, Inc. Fraud detection system, fraud detection method, and program
CN113922991A (en) * 2021-09-18 2022-01-11 深信服科技股份有限公司 Resource monitoring method and device, electronic equipment and storage medium
CN114399311A (en) * 2022-01-17 2022-04-26 支付宝实验室(新加坡)有限公司 Risk identification method and device
CN114723457A (en) * 2022-04-25 2022-07-08 平安资产管理有限责任公司 Resource request monitoring method and device, computer equipment and storage medium
CN114862407A (en) * 2022-05-19 2022-08-05 中国银行股份有限公司 Data processing method, device and equipment based on block chain
CN115170301A (en) * 2022-06-07 2022-10-11 支付宝(杭州)信息技术有限公司 Risk identification method, device and equipment for transaction account
US12444009B2 (en) 2022-09-02 2025-10-14 Bank Of America Corporation Systems and methods for generating and training a module selection engine for distribution allocation in a network environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714479A (en) * 2012-10-09 2014-04-09 四川欧润特软件科技有限公司 Intelligent centralized monitor method and system for bank personal business fraudulent conducts
CN104881783A (en) * 2015-05-14 2015-09-02 中国科学院信息工程研究所 E-bank account fraudulent conduct and risk detecting method and system
CN105631747A (en) * 2014-11-05 2016-06-01 阿里巴巴集团控股有限公司 Risk event determining method and apparatus

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7861924B1 (en) 2002-11-26 2011-01-04 Diebold Self-Service Systems Division Of Diebold, Incorporated Banking system controlled responsive to data bearing records
US7333953B1 (en) 2000-10-31 2008-02-19 Wells Fargo Bank, N.A. Method and apparatus for integrated payments processing and decisioning for internet transactions
US7809650B2 (en) * 2003-07-01 2010-10-05 Visa U.S.A. Inc. Method and system for providing risk information in connection with transaction processing
US7958027B2 (en) 2001-03-20 2011-06-07 Goldman, Sachs & Co. Systems and methods for managing risk associated with a geo-political area
US20030233319A1 (en) 2001-03-20 2003-12-18 David Lawrence Electronic fund transfer participant risk management clearing
US20030023555A1 (en) 2001-07-26 2003-01-30 Cashworks, Inc. Method and system for providing financial services
AU2002367595A1 (en) 2001-11-28 2003-09-22 Goldman, Sachs And Co. Transaction surveillance
US7346575B1 (en) 2002-01-07 2008-03-18 First Data Corporation Systems and methods for selectively delaying financial transactions
US20060146839A1 (en) 2002-09-06 2006-07-06 Hurwitz Harlan A Payment and media management
US20050080717A1 (en) 2003-09-25 2005-04-14 Boris Belyi Data validation systems and methods for financial transactions
US7537153B2 (en) 2004-05-03 2009-05-26 De La Rue International, Limited Method and computer program product for electronically managing payment media
US7941370B2 (en) 2006-04-25 2011-05-10 Uc Group Limited Systems and methods for funding payback requests for financial transactions
US7657497B2 (en) * 2006-11-07 2010-02-02 Ebay Inc. Online fraud prevention using genetic algorithm solution
US8600872B1 (en) 2007-07-27 2013-12-03 Wells Fargo Bank, N.A. System and method for detecting account compromises
US20090106151A1 (en) * 2007-10-17 2009-04-23 Mark Allen Nelsen Fraud prevention based on risk assessment rule
US8510199B1 (en) 2008-04-04 2013-08-13 Marketcore.Com, Inc. Method and apparatus for financial product risk determination
CN101714273A (en) * 2009-05-26 2010-05-26 北京银丰新融科技开发有限公司 Rule engine-based method and system for monitoring exceptional service of bank
US8600873B2 (en) * 2009-05-28 2013-12-03 Visa International Service Association Managed real-time transaction fraud analysis and decisioning
US20110016052A1 (en) 2009-07-16 2011-01-20 Scragg Ernest M Event Tracking and Velocity Fraud Rules for Financial Transactions
US8473415B2 (en) 2010-05-04 2013-06-25 Kevin Paul Siegel System and method for identifying a point of compromise in a payment transaction processing system
CN101976419A (en) * 2010-10-19 2011-02-16 中国工商银行股份有限公司 Processing method and system for risk monitoring and controlling of transaction data
CN107103548A (en) * 2011-11-17 2017-08-29 阿里巴巴集团控股有限公司 The monitoring method and system and risk monitoring and control method and system of network behavior data
US10163158B2 (en) * 2012-08-27 2018-12-25 Yuh-Shen Song Transactional monitoring system
US20140180974A1 (en) * 2012-12-21 2014-06-26 Fair Isaac Corporation Transaction Risk Detection
CN103049851A (en) * 2012-12-27 2013-04-17 中国建设银行股份有限公司 Transaction data-based anti-fraud monitoring method and device
US20150039512A1 (en) * 2014-08-08 2015-02-05 Brighterion, Inc. Real-time cross-channel fraud protection
CN105590207A (en) 2014-12-30 2016-05-18 中国银联股份有限公司 Method and device for identifying telecom fraud based on scoring rules and transaction path
US20160321661A1 (en) * 2015-04-29 2016-11-03 The Retail Equation, Inc. Systems and methods for organizing, visualizing and processing consumer transactions data
CN106611375A (en) * 2015-10-22 2017-05-03 北京大学 Text analysis-based credit risk assessment method and apparatus
CN105389728A (en) 2015-11-13 2016-03-09 中国建设银行股份有限公司 Method and system for detecting nature of bank account
TWI584215B (en) * 2015-12-31 2017-05-21 玉山商業銀行股份有限公司 Method of monitoring suspicious transactions
US20170262852A1 (en) * 2016-03-10 2017-09-14 Amadeus S.A.S. Database monitoring system
US11037158B2 (en) * 2016-03-29 2021-06-15 Microsoft Technology Licensing, Llc Bulk dispute challenge system
US9801066B1 (en) * 2016-06-02 2017-10-24 Duo Security, Inc. Method for automatic possession-factor authentication
US10496996B2 (en) * 2016-06-23 2019-12-03 Capital One Services, Llc Neural network systems and methods for generating distributed representations of electronic transaction information
WO2018057813A2 (en) * 2016-09-21 2018-03-29 PINN Technologies System for user identification and authentication
WO2018074902A2 (en) * 2016-10-20 2018-04-26 Samsung Electronics Co., Ltd. System and method for mobile wallet remittance
KR101775400B1 (en) 2017-02-02 2017-09-08 (주) 펀딩팩토리 The investor leading franchiser funding system via platform construction
US10657525B2 (en) * 2017-06-27 2020-05-19 Kasisto, Inc. Method and apparatus for determining expense category distance between transactions via transaction signatures
US10643215B2 (en) * 2017-07-31 2020-05-05 Ncr Corporation In situ and network-based transaction classifying systems and methods
US11200577B2 (en) * 2017-08-31 2021-12-14 Paypal, Inc. Convolutional neural networks for variable prediction using raw data
CN108492104B (en) * 2018-02-12 2020-10-02 阿里巴巴集团控股有限公司 A resource transfer monitoring method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714479A (en) * 2012-10-09 2014-04-09 四川欧润特软件科技有限公司 Intelligent centralized monitor method and system for bank personal business fraudulent conducts
CN105631747A (en) * 2014-11-05 2016-06-01 阿里巴巴集团控股有限公司 Risk event determining method and apparatus
CN104881783A (en) * 2015-05-14 2015-09-02 中国科学院信息工程研究所 E-bank account fraudulent conduct and risk detecting method and system

Also Published As

Publication number Publication date
TWI698770B (en) 2020-07-11
WO2019154115A1 (en) 2019-08-15
US11526889B2 (en) 2022-12-13
CN108492104A (en) 2018-09-04
SG11202006760TA (en) 2020-08-28
US20200327551A1 (en) 2020-10-15
TW201935307A (en) 2019-09-01

Similar Documents

Publication Publication Date Title
CN108492104B (en) A resource transfer monitoring method and device
TWI673666B (en) Method and device for data risk control
CN110413877B (en) Resource recommendation method and device and electronic equipment
EP3780541B1 (en) Identity information identification method and device
TWI769190B (en) Risk management method and device
CN107424069B (en) Wind control feature generation method, risk monitoring method and equipment
CN107767021A (en) A kind of risk control method and equipment
US11468446B2 (en) Method for adjusting risk parameter, and method and device for risk identification
CN111539811B (en) Risk account identification method and device
CN109272323B (en) A risk transaction identification method, device, equipment and medium
TW201923685A (en) Risk identification model construction and risk identification method, device and device
CN110609941B (en) Risk identification method and device for Internet operation events
CN107679856B (en) Transaction-based business control method and device
WO2021017430A1 (en) Block chain-based transaction, transaction supervision method, device and apparatus
TW201734893A (en) Credit score acquisition, feature vector value output method and device thereof
CN113344695B (en) An elastic risk control method, device, device and readable medium
CN108108866A (en) Method and device for risk control
CN109614414B (en) User information determining method and device
CN107018115B (en) Account processing method and device
CN110276178A (en) Risk control method, device and equipment based on identity authentication
TWI686750B (en) Method and device for identifying user's potential knowledge points for help
CN110458571B (en) Risk identification method, device and equipment for information leakage
CN111784357A (en) Risk event processing method and device
CN110175733B (en) A public opinion information processing method and server
CN109582834B (en) Data risk prediction method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.